• Advisory ID: DRUPAL-SA-2007-007
  • Project: Textimage (third-party module)
  • Version: 4.7.x, 5.x
  • Date: 2007-Jan-31
  • Security risk: Less critical
  • Exploitable from: Remote
  • Vulnerability: Captcha bypass


Captcha validation by Textimage can be bypassed by manipulating request variables while posting. This defeats the purpose of the captcha and makes automated submission possible.

Versions affected

  • All versions of Textimage 4.7.x prior to Textimage 4.7-1.2.
  • All versions of Textimage 5.x prior to Textimage 5.x-1.1.

Drupal core is not affected. If you do not use the contributed Captcha module, there is nothing you need to do.


Install the latest version:

See also the Textimage project page.

Reported by

Thomas Nilsson.


The security contact for Drupal can be reached at security at drupal.org or via the form at http://drupal.org/contact.