First published: Wed Apr 26 2023(Updated: )
Drupal core's form API has a vulnerability where certain contributed or custom modules' forms may be vulnerable to improper input validation. This could allow an attacker to inject disallowed values or overwrite data. Affected forms are uncommon, but in certain cases an attacker could alter critical or sensitive data.
Credit: mlhess@drupal.org mlhess@drupal.org
Affected Software | Affected Version | How to fix |
---|---|---|
Drupal Drupal | >=8.0.0<9.2.18 | |
Drupal Drupal | >=9.3.0<9.3.12 | |
composer/drupal/core | >=9.3.0<9.3.12 | 9.3.12 |
composer/drupal/core | >=8.0.0<9.2.18 | 9.2.18 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2022-25273.
The severity of CVE-2022-25273 is high with a severity value of 7.5.
The affected software for CVE-2022-25273 is Drupal core versions between 8.0.0 and 9.2.18, and versions between 9.3.0 and 9.3.12.
The impact of CVE-2022-25273 is that certain contributed or custom modules' forms may be vulnerable to improper input validation, allowing an attacker to inject disallowed values or overwrite data.
To fix CVE-2022-25273, it is recommended to update Drupal core to a version that includes the patch for this vulnerability, which can be found in the official Drupal security advisory.