[CIVN-2026-0201] Multiple Vulnerabilities in Drupal

By Published On: April 23, 2026

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA256


Multiple Vulnerabilities in Drupal


Indian – Computer Emergency Response Team (https://www.cert-in.org.in)


Severity Rating: HIGH


Software Affected


Drupal Core versions from 8.0.0 to prior to 10.5.9

Drupal Core versions from 10.6.0 to prior to 10.6.7

Drupal Core versions from 11.0.0 to prior to 11.2.11

Drupal Core versions from 11.3.0 to prior to 11.3.7

Overview


Multiple vulnerabilities have been reported in Drupal core which could allow an attacker to disclose sensitive information, escalate privileges, execute remote code and perform Cross-site Scripting (XSS) attacks on the targeted system.


Target Audience:

Individuals and end-user organizations using Drupal.


Risk Assessment:

High risk of unauthorized access, privilege escalation, persistent cross-site scripting (XSS), and account takeover.


Impact Assessment:

Potential for account compromise, data exposure, unauthorized access, execute remote code and gain elevated privileges.


Description


Drupal is an open-source, content management system (CMS) which allows individuals and organizations to create, manage and maintain websites and web applications.


These vulnerabilities exist in a Drupal core due to insufficient sanitization of user-supplied data in jQuery integration for AJAX modal dialog boxes and gadget chain issue. An attacker could exploit these vulnerabilities by sending specially crafted inputs.


Successful exploitation of these vulnerabilities could allow an attacker to disclose sensitive information, escalate privileges, execute remote code and perform Cross-site Scripting (XSS) attacks on the targeted system.


Note: Drupal 11.1.x, Drupal 11.0.x, Drupal 10.4.x, and all prior releases have reached end-of-life and no longer receive security support. Drupal 8 and Drupal 9 have also reached end-of-life.


Solution


Upgrade to the latest versions as mentioned in the security advisories:

https://www.drupal.org/sa-contrib-2026-001


https://www.drupal.org/sa-core-2026-002


https://www.drupal.org/sa-core-2026-003



Vendor Information


Drupal

https://www.drupal.org


References


Drupal

https://www.drupal.org/sa-contrib-2026-001

https://www.drupal.org/sa-core-2026-002

https://www.drupal.org/sa-core-2026-003


CVE Name

CVE-2026-6365

CVE-2026-6366

CVE-2026-6367




– —


Thanks and Regards,

CERT-In


Incident Response Help Desk

e-mail: incident@cert-in.org.in

Phone: +91-11-22902657

Toll Free Number: 1800-11-4949

Toll Free Fax : 1800-11-6969

Web: http://www.cert-in.org.in

PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4

PGP Key information:

https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS


Postal address:

Indian Computer Emergency Response Team (CERT-In)

Ministry of Electronics and Information Technology

Government of India

Electronics Niketan

6, C.G.O. Complex

New Delhi-110 003

—–BEGIN PGP SIGNATURE—–


iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmnqJJsACgkQ3jCgcSdc

ys9QEQ/8CE6h+v8gy/YWHq18kdbkkzeKdb7GpfcvObuYwJ+ESqZ59zsreuTuiIlb

v1d7kxEPQXe97P9PU78u1i5ZA1seLqDf8NDrOK8rf96nESTeNwph3oshm9ATBtJ3

kIZIlGyf1bA5YIBmA0ihG14+6zt32Io6645OfCAtEWz8jA53yNh9n79yOd9DQ1rW

H9hkH1o1nnZtRN/N1EOBX6Ws0VFwvZBnvc1XhaXfuHVwRiUqkcXj8F0SZwJETdFO

CfgduS7xR9hJJVOHZUslcwWioTYnHzkvetofRX9aTDvPTtYtThIDc8s/nsYqKKT/

0+94DQvBGS5e/YgKuIMPZJ/z4behdXKKF/cBPJdbIIjpzR58UP+9pcJ8yqcP6fD0

0DfAzGGq6qlZfJHDScv17vnSVeSdOUkaG3XBh85Ky8n6AI9Vy95gHtntdI/ISSPu

3Vt/UNyGY+vngbQGPu25AN4l1A0dW4fAnx0NIAAU5SKeGrLWa8rNJxqxi0b41LeS

3NH5UPuD6M+AKQfX/u+Y1gcNsC14rU3YcJwgghf74yu31f4vdAPgxiCikzkZLh1W

GTMHvCaLvCsTvOiFjA4iTLnaOYIbi1t+el+f2SD5LcEoIkbCNZW9c1rQGeRmAHC6

D/is7AJRVu4z3nVSA1RXw23vEJJ6pB6uIcxJIKQ2ChxpiS/8YGU=

=8zUX

—–END PGP SIGNATURE—–

Share this article