First published: Wed Feb 16 2022(Updated: )
Drupal core's form API has a vulnerability where certain contributed or custom modules' forms may be vulnerable to improper input validation. This could allow an attacker to inject disallowed values or overwrite data. Affected forms are uncommon, but in certain cases an attacker could alter critical or sensitive data.
Credit: mlhess@drupal.org
Affected Software | Affected Version | How to fix |
---|---|---|
Drupal Drupal | >=7.0.0<7.88 | |
Drupal Drupal | >=9.2.0<9.2.13 | |
Drupal Drupal | >=9.3.0<9.3.6 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-25271 is a vulnerability in Drupal core's form API that allows certain contributed or custom modules' forms to be vulnerable to improper input validation.
CVE-2022-25271 has a severity score of 7.5, which is considered high.
CVE-2022-25271 affects Drupal versions 7.0.0 to 7.88, 9.2.0 to 9.2.13, and 9.3.0 to 9.3.6.
An attacker could exploit CVE-2022-25271 by injecting disallowed values or overwriting data in certain vulnerable forms.
Yes, you can find references for CVE-2022-25271 at the following links: [Link 1](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVKIOWSXL2RF2ULNAP7PHESYCFSZIJE3/), [Link 2](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGSY236PYSFYIEBRGDERLA7OSY6D7XL4/), [Link 3](https://www.drupal.org/sa-core-2022-003).