it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
[IT-SecNots] [Security-news] Drupal core - Critical - Cross-site scripting - SA-CORE-2026-001
Chronologisch Thread
- From: security-news AT drupal.org
- To: security-news AT drupal.org
- Subject: [IT-SecNots] [Security-news] Drupal core - Critical - Cross-site scripting - SA-CORE-2026-001
- Date: Wed, 15 Apr 2026 19:24:32 +0000
- Archived-at: <https://lists.drupal.org/mailman3/hyperkitty/list/security-news AT drupal.org/message/25TBTS5XMURT3NVI7HDAL5LGGWUTTDJF/>
- Authentication-results: lists.piratenpartei.de; dkim=pass header.d=drupal.org header.s=default header.b=BJwwswD9; dkim=fail ("body hash did not verify") header.d=drupal.org header.s=f34odw3mfzgsrgyn3evjayysxxl6jizn header.b=VCu+5c5f; dkim=fail ("body hash did not verify") header.d=amazonses.com header.s=hsbnp7p3ensaochzwyq5wwmceodymuwv header.b=PF9scLRq; dmarc=pass (policy=none) header.from=drupal.org; spf=pass (lists.piratenpartei.de: domain of security-news-bounces AT drupal.org designates 2605:bc80:3010::137 as permitted sender) smtp.mailfrom=security-news-bounces AT drupal.org
- Dkim-filter: OpenDKIM Filter v2.11.0 smtp4.osuosl.org 693FE42B1F
- Dkim-filter: OpenDKIM Filter v2.11.0 smtp1.osuosl.org D4C0E84DFE
- Dmarc-filter: OpenDMARC Filter v1.4.2 smtp1.osuosl.org D4C0E84DFE
- Feedback-id: ::1.us-west-2.eaokZ1GT8utLqfMHQoyOsEFVrSIzzS6R+14LP6WIIUY=:AmazonSES
- List-archive: <https://lists.drupal.org/mailman3/hyperkitty/list/security-news AT drupal.org/>
- List-id: <security-news.drupal.org>
View online: https://www.drupal.org/sa-core-2026-001
Project: Drupal core [1]
Date: 2026-April-15
Security risk: *Critical* 15 ∕ 25
AC:Complex/A:None/CI:Some/II:Some/E:Theoretical/TD:All [2]
Vulnerability: Cross-site scripting
Affected versions: >= 8.0.0 < 10.5.9 || >= 10.6.0 < 10.6.7 || >= 11.0.0 <
11.2.11 || >= 11.3.0 < 11.3.7
CVE IDs: CVE-2026-6365
Description:
Drupal core's jQuery integration for AJAX modal dialog boxes does not
sufficiently sanitize certain options, which which can lead to a cross-site
scripting (XSS) vulnerability.
Solution:
Install the latest version:
* If you use Drupal 10.5.x, update to Drupal 10.5.9 [3].
* If you use Drupal 10.6.x, update to Drupal 10.6.7 [4].
* If you use Drupal 11.2.x, update to Drupal 11.2.11 [5].
* If you use Drupal 11.3.x, update to Drupal 11.3.7 [6].
Drupal 11.1.x, Drupal 11.0.x, Drupal 10.4.x, and below are end-of-life and do
not receive security coverage. (Drupal 8 [7] and Drupal 9 [8] have both
reached end-of-life.)
Reported By:
* Murat Kekiç (murat_kekic) [9]
Fixed By:
* Anna Kalata (akalata) [10] of the Drupal Security Team
* Benji Fisher (benjifisher) [11] of the Drupal Security Team
* Neil Drumm (drumm) [12] of the Drupal Security Team
* Lee Rowlands (larowlan) [13] of the Drupal Security Team
* Michael Hess (mlhess) [14] of the Drupal Security Team
* James Gilliland (neclimdul) [15] of the Drupal Security Team
* Joseph Zhao (pandaski) [16] of the Drupal Security Team
* Juraj Nemec (poker10) [17] of the Drupal Security Team
* Ra Mänd (ram4nd) [18], provisional member of the Drupal Security Team
* Jess (xjm) [19] of the Drupal Security Team
Coordinated By:
* Greg Knaddison (greggles) [20] of the Drupal Security Team
* Lee Rowlands (larowlan) [21] of the Drupal Security Team
* Pierre Rudloff (prudloff) [22] of the Drupal Security Team
* Jess (xjm) [23] of the Drupal Security Team
Security
issue: https://git.drupalcode.org/security/11-drupal-security/-/issues/1
[24]
------------------------------------------------------------------------------
Contribution record [25]
[1] https://www.drupal.org/project/drupal
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/drupal/releases/10.5.9
[4] https://www.drupal.org/project/drupal/releases/10.6.7
[5] https://www.drupal.org/project/drupal/releases/11.2.11
[6] https://www.drupal.org/project/drupal/releases/11.3.7
[7] https://www.drupal.org/psa-2021-06-29
[8] https://www.drupal.org/psa-2023-11-01
[9] https://www.drupal.org/u/murat_kekic
[10] https://www.drupal.org/u/akalata
[11] https://www.drupal.org/u/benjifisher
[12] https://www.drupal.org/u/drumm
[13] https://www.drupal.org/u/larowlan
[14] https://www.drupal.org/u/mlhess
[15] https://www.drupal.org/u/neclimdul
[16] https://www.drupal.org/u/pandaski
[17] https://www.drupal.org/u/poker10
[18] https://www.drupal.org/u/ram4nd
[19] https://www.drupal.org/u/xjm
[20] https://www.drupal.org/u/greggles
[21] https://www.drupal.org/u/larowlan
[22] https://www.drupal.org/u/prudloff
[23] https://www.drupal.org/u/xjm
[24] https://git.drupalcode.org/security/11-drupal-security/-/issues/1
[25] https://new.drupal.org/contribution-record?source_link=https%3A//www.drupal.org/node/3584021
_______________________________________________
Security-news mailing list -- security-news AT drupal.org
To unsubscribe send an email to security-news-leave AT drupal.org
Unsubscribe at
- [IT-SecNots] [Security-news] Drupal core - Critical - Cross-site scripting - SA-CORE-2026-001, security-news, 15.04.2026
Archiv bereitgestellt durch MHonArc 2.6.19+.