OpenID Connect / OAuth client - Moderately critical - Access bypass - SA-CONTRIB-2026-026

Date: 
2026-March-04
CVE IDs: 
CVE-2026-3531

This module enables you to use an external OpenID Connect login provider to authenticate and log in users on your site. If a user signs in with a login provider for the first time on the website, a new Drupal user will be created.

A visitor who successfully logs in to their Identity Provider and is denied access to Drupal through custom code or a server error will maintain their session at the Identity Provider, possibly leading to access bypass situations, especially in a shared computing environment.

OpenID Connect / OAuth client - Moderately critical - Server-side request forgery, Information disclosure - SA-CONTRIB-2026-025

Date: 
2026-March-04
CVE IDs: 
CVE-2026-3530

This module enables you to use an external OpenID Connect login provider to authenticate and log in users on your site. If a user signs in with a login provider for the first time on the website, a new Drupal user will be created.

The module doesn't sufficiently validate certain fields coming from the identity provider, which could lead to SSRF and information disclosures.

Google Analytics GA4 - Moderately critical - Cross-site Scripting - SA-CONTRIB-2026-024

Date: 
2026-March-04
CVE IDs: 
CVE-2026-3529

The Google Analytics GA4 module enables users to add custom attributes to the script tag used to load the Google Analytics library. The module does not sufficiently sanitize these attributes.

This vulnerability is mitigated by the fact that an attacker must have a role with the "ga4 configure" (or "administer google analytics ga4 settings") permission.

Calculation Fields - Moderately critical - Cross-site Scripting - SA-CONTRIB-2026-023

Date: 
2026-March-04
CVE IDs: 
CVE-2026-3528

This module extends the Drupal form API adding "Calculation element" form element types, which can evaluate a maths expression. It offers webform integration.

The module doesn't sufficiently validate user input; this could be exploited to achieve Information Disclosure or Cross-site Scripting (XSS).

AJAX Dashboard - Critical - Access bypass - SA-CONTRIB-2026-022

Date: 
2026-March-04
CVE IDs: 
CVE-2026-3527

AJAX Dashboard: Entity Dashboards enables you to create configurable dashboards attached to entities which include AJAX-reloading of a main content area based on inputs from a configurable set of buttons.

The module doesn't sufficiently check access on the dashboard configuration route. Unauthorized users could access the entity dashboard configuration page and either enable or disable dashboards. The affected administration page does not permit editing the configurations of the dashboards themselves.

File Access Fix (deprecated) - Moderately critical - Access bypass - SA-CONTRIB-2026-021

Date: 
2026-March-04
CVE IDs: 
CVE-2026-3526

This module moves files to and from private storage depending on the access of its owning entities.

The module does not always validate the access logic correctly, resulting in files attached to an entity not being protected in certain circumstances.

This vulnerability is mitigated by the fact that saving an entity a second time resolves the issue.

File Access Fix (deprecated) - Moderately critical - Access bypass - SA-CONTRIB-2026-020

Date: 
2026-March-04
CVE IDs: 
CVE-2026-3525

This module moves files to and from private storage depending on the access of its owning entities.
The module does not sufficiently incorporate the results of hook_file_download when a custom or contrib module implements that hook leading to access bypass.

Responsive Favicons - Moderately critical - Cross-site scripting - SA-CONTRIB-2026-019

Date: 
2026-February-25
CVE IDs: 
CVE-2026-3218

This module adds the favicons generated by realfavicongenerator.net to your Drupal site.

The module does not filter administrator-entered text, leading to a persistent Cross-site scripting (XSS) vulnerability.

This vulnerability is mitigated by the fact that an attacker must have a role with the permission "administer responsive favicons".

SAML SSO - Service Provider - Critical - Cross-site scripting - SA-CONTRIB-2026-018

Date: 
2026-February-25
CVE IDs: 
CVE-2026-3217

This module enables you to perform SAML protocol-based single sign-on (SSO) on a Drupal site.

The module doesn't sufficiently sanitize user input, leading to a reflected Cross-site scripting (XSS) vulnerability.

Drupal Canvas - Moderately critical - Server-side request forgery, Information disclosure - SA-CONTRIB-2026-017

Date: 
2026-February-25
CVE IDs: 
CVE-2026-3216

This module enables you to easily theme and build an entire website using only their browser, without the need to write code beyond basic JSX and CSS. Content creators are able to compose content on any part of the page without relying on developers.

The project has a hidden sub-module, Drupal Canvas AI, which is disabled by default. It is typically enabled as a dependency by Drupal Recipes or enabled directly via deployment scripts (e.g., Drush). When the submodule is enabled, the following vulnerability is exposed.

Pages

Subscribe with RSS Subscribe to Security advisories