Zum Inhalt springen.
Sympa Menü

it-securitynotifies - [IT-SecNots] [Security-news] Drupal core - Moderately critical - Gadget chain - SA-CORE-2025-006

it-securitynotifies AT lists.piratenpartei.de

Betreff: Sicherheitsankündigungen

Listenarchiv

[IT-SecNots] [Security-news] Drupal core - Moderately critical - Gadget chain - SA-CORE-2025-006


Chronologisch Thread  
  • From: security-news AT drupal.org
  • To: security-news AT drupal.org
  • Subject: [IT-SecNots] [Security-news] Drupal core - Moderately critical - Gadget chain - SA-CORE-2025-006
  • Date: Thu, 13 Nov 2025 00:13:49 +0000 (UTC)
  • Authentication-results: lists.piratenpartei.de; dkim=pass header.d=drupal.org header.s=default header.b=AJWMNYFa; dmarc=pass (policy=none) header.from=drupal.org; spf=pass (lists.piratenpartei.de: domain of security-news-bounces AT drupal.org designates 140.211.166.133 as permitted sender) smtp.mailfrom=security-news-bounces AT drupal.org
  • Dkim-filter: OpenDKIM Filter v2.11.0 smtp2.osuosl.org 4809540B45
  • Dkim-filter: OpenDKIM Filter v2.11.0 smtp4.osuosl.org 23CDC40B84
  • List-archive: <http://lists.drupal.org/pipermail/security-news/>
  • List-id: <security-news.drupal.org>

View online: https://www.drupal.org/sa-core-2025-006

Project: Drupal core [1]
Date: 2025-November-12
Security risk: *Moderately critical* 14 ∕ 25
AC:Complex/A:Admin/CI:All/II:All/E:Theoretical/TD:Uncommon [2]
Vulnerability: Gadget chain

Affected versions: >= 8.0.0 < 10.4.9 || >= 10.5.0 < 10.5.6 || >= 11.0.0 <
11.1.9 || >= 11.2.0 < 11.2.8
CVE IDs: CVE-2025-13081
Description: 
Drupal core contains a chain of methods that is exploitable when an insecure
deserialization vulnerability exists on the site. This so-called "gadget
chain" presents no direct threat, but is a vector that can be used to achieve
remote code execution if the application deserializes untrusted data due to
another vulnerability.

It is not directly exploitable.

This issue is mitigated by the fact that in order for it to be exploitable, a
separate vulnerability must be present to allow an attacker to pass unsafe
input to unserialize(). There are no such known exploits in Drupal core.

Solution: 
Install the latest version:

* If you are using Drupal 10.4, update to Drupal 10.4.9 [3].
* If you are using Drupal 10.5, update to Drupal 10.5.6 [4].
* If you are using Drupal 11.1, update to Drupal 11.1.9 [5].
* If you are using Drupal 11.2, update to Drupal 11.2.8 [6].

Drupal 11.0.x, Drupal 10.3.x, and below are end-of-life and do not receive
security coverage. (Drupal 8 [7] and Drupal 9 [8] have both reached
end-of-life.)

Reported By: 
* anzuukino [9]

Fixed By: 
* Anna Kalata (akalata) [10], provisional member of the Drupal Security Team
* catch (catch) [11] of the Drupal Security Team
* Neil Drumm (drumm) [12] of the Drupal Security Team
* Greg Knaddison (greggles) [13] of the Drupal Security Team
* Lee Rowlands (larowlan) [14] of the Drupal Security Team
* Dave Long (longwave) [15] of the Drupal Security Team
* Drew Webber (mcdruid) [16] of the Drupal Security Team
* Juraj Nemec (poker10) [17] of the Drupal Security Team
* Ra Mänd (ram4nd) [18], provisional member of the Drupal Security Team
* Jess (xjm) [19] of the Drupal Security Team

Coordinated By: 
* catch (catch) [20] of the Drupal Security Team
* Lee Rowlands (larowlan) [21] of the Drupal Security Team
* Dave Long (longwave) [22] of the Drupal Security Team
* Drew Webber (mcdruid) [23] of the Drupal Security Team
* Juraj Nemec (poker10) [24] of the Drupal Security Team

------------------------------------------------------------------------------
Contribution record [25]

[1] https://www.drupal.org/project/drupal
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/drupal/releases/10.4.9
[4] https://www.drupal.org/project/drupal/releases/10.5.6
[5] https://www.drupal.org/project/drupal/releases/11.1.9
[6] https://www.drupal.org/project/drupal/releases/11.2.8
[7] https://www.drupal.org/psa-2021-06-29
[8] https://www.drupal.org/psa-2023-11-01
[9] https://www.drupal.org/u/anzuukino
[10] https://www.drupal.org/u/akalata
[11] https://www.drupal.org/u/catch
[12] https://www.drupal.org/u/drumm
[13] https://www.drupal.org/u/greggles
[14] https://www.drupal.org/u/larowlan
[15] https://www.drupal.org/u/longwave
[16] https://www.drupal.org/u/mcdruid
[17] https://www.drupal.org/u/poker10
[18] https://www.drupal.org/u/ram4nd
[19] https://www.drupal.org/u/xjm
[20] https://www.drupal.org/u/catch
[21] https://www.drupal.org/u/larowlan
[22] https://www.drupal.org/u/longwave
[23] https://www.drupal.org/u/mcdruid
[24] https://www.drupal.org/u/poker10
[25] https://new.drupal.org/contribution-record?source_link=https%3A//www.drupal.org/node/3557475

_______________________________________________
Security-news mailing list
Security-news AT drupal.org
Unsubscribe at https://lists.drupal.org/mailman/listinfo/security-news


  • [IT-SecNots] [Security-news] Drupal core - Moderately critical - Gadget chain - SA-CORE-2025-006, security-news, 13.11.2025

Archiv bereitgestellt durch MHonArc 2.6.19+.

Seitenanfang