it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
[IT-SecNots] [Security-news] Drupal core - Moderately critical - Gadget Chain - SA-CORE-2026-002
Chronologisch Thread
- From: security-news AT drupal.org
- To: security-news AT drupal.org
- Subject: [IT-SecNots] [Security-news] Drupal core - Moderately critical - Gadget Chain - SA-CORE-2026-002
- Date: Wed, 15 Apr 2026 19:25:24 +0000
- Archived-at: <https://lists.drupal.org/mailman3/hyperkitty/list/security-news AT drupal.org/message/GS6VYYLKV7UP7YZCYB7JYTOR4WEUUROA/>
- Authentication-results: lists.piratenpartei.de; dkim=pass header.d=drupal.org header.s=default header.b=CoLdZ1Ub; dkim=fail ("body hash did not verify") header.d=drupal.org header.s=f34odw3mfzgsrgyn3evjayysxxl6jizn header.b=HEytEMUd; dkim=fail ("body hash did not verify") header.d=amazonses.com header.s=hsbnp7p3ensaochzwyq5wwmceodymuwv header.b=xjhuyuTW; dmarc=pass (policy=none) header.from=drupal.org; spf=pass (lists.piratenpartei.de: domain of security-news-bounces AT drupal.org designates 2605:bc80:3010::133 as permitted sender) smtp.mailfrom=security-news-bounces AT drupal.org
- Dkim-filter: OpenDKIM Filter v2.11.0 smtp2.osuosl.org 49E66428B6
- Dkim-filter: OpenDKIM Filter v2.11.0 smtp3.osuosl.org A8C5A60B31
- Dmarc-filter: OpenDMARC Filter v1.4.2 smtp3.osuosl.org A8C5A60B31
- Feedback-id: ::1.us-west-2.eaokZ1GT8utLqfMHQoyOsEFVrSIzzS6R+14LP6WIIUY=:AmazonSES
- List-archive: <https://lists.drupal.org/mailman3/hyperkitty/list/security-news AT drupal.org/>
- List-id: <security-news.drupal.org>
View online: https://www.drupal.org/sa-core-2026-002
Project: Drupal core [1]
Date: 2026-April-15
Security risk: *Moderately critical* 14 ∕ 25
AC:Complex/A:Admin/CI:All/II:All/E:Theoretical/TD:Uncommon [2]
Vulnerability: Gadget Chain
Affected versions: >= 8.0.0 < 10.5.9 || >= 10.6.0 < 10.6.7 || >= 11.0.0 <
11.2.11 || >= 11.3.0 < 11.3.7
CVE IDs: CVE-2026-6366
Description:
Drupal core contains a chain of methods that could be exploitable when an
insecure deserialization vulnerability exists on the site. This so-called
"gadget chain" presents no direct threat, but is a vector that can be used to
achieve remote code execution or SQL injection if the application
deserializes untrusted data due to another vulnerability.
This issue is not directly exploitable.
This issue is mitigated by the fact that in order for it to be exploitable, a
separate vulnerability must be present to allow an attacker to pass unsafe
input to unserialize(). There are no such known exploits in Drupal core.
Solution:
Install the latest version:
* If you use Drupal 10.5.x, update to Drupal 10.5.9 [3].
* If you use Drupal 10.6.x, update to Drupal 10.6.7 [4].
* If you use Drupal 11.2.x, update to Drupal 11.2.11 [5].
* If you use Drupal 11.3.x, update to Drupal 11.3.7 [6].
Drupal 11.1.x, Drupal 11.0.x, Drupal 10.4.x, and below are end-of-life and do
not receive security coverage. (Drupal 8 [7] and Drupal 9 [8] have both
reached end-of-life.)
Reported By:
* Truong Le (hswww) [9]
* menon [10]
* t-chen [11]
Fixed By:
* Benji Fisher (benjifisher) [12] of the Drupal Security Team
* cilefen (cilefen) [13] of the Drupal Security Team
* Neil Drumm (drumm) [14] of the Drupal Security Team
* Greg Knaddison (greggles) [15] of the Drupal Security Team
* Lee Rowlands (larowlan) [16] of the Drupal Security Team
* Dave Long (longwave) [17] of the Drupal Security Team
* Drew Webber (mcdruid) [18] of the Drupal Security Team
* Ra Mänd (ram4nd) [19], provisional member of the Drupal Security Team
* Jess (xjm) [20] of the Drupal Security Team
Coordinated By:
* Greg Knaddison (greggles) [21] of the Drupal Security Team
* Lee Rowlands (larowlan) [22] of the Drupal Security Team
* Dave Long (longwave) [23] of the Drupal Security Team
* Drew Webber (mcdruid) [24] of the Drupal Security Team
* Juraj Nemec (poker10) [25] of the Drupal Security Team
* Jess (xjm) [26] of the Drupal Security Team
Security
issue: https://git.drupalcode.org/security/33-drupal-security/-/work_items/1
[27]
------------------------------------------------------------------------------
Contribution record [28]
[1] https://www.drupal.org/project/drupal
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/drupal/releases/10.5.9
[4] https://www.drupal.org/project/drupal/releases/10.6.7
[5] https://www.drupal.org/project/drupal/releases/11.2.11
[6] https://www.drupal.org/project/drupal/releases/11.3.7
[7] https://www.drupal.org/psa-2021-06-29
[8] https://www.drupal.org/psa-2023-11-01
[9] https://www.drupal.org/u/hswww
[10] https://www.drupal.org/u/menon
[11] https://www.drupal.org/u/t-chen
[12] https://www.drupal.org/u/benjifisher
[13] https://www.drupal.org/u/cilefen
[14] https://www.drupal.org/u/drumm
[15] https://www.drupal.org/u/greggles
[16] https://www.drupal.org/u/larowlan
[17] https://www.drupal.org/u/longwave
[18] https://www.drupal.org/u/mcdruid
[19] https://www.drupal.org/u/ram4nd
[20] https://www.drupal.org/u/xjm
[21] https://www.drupal.org/u/greggles
[22] https://www.drupal.org/u/larowlan
[23] https://www.drupal.org/u/longwave
[24] https://www.drupal.org/u/mcdruid
[25] https://www.drupal.org/u/poker10
[26] https://www.drupal.org/u/xjm
[27] https://git.drupalcode.org/security/33-drupal-security/-/work_items/1
[28] https://new.drupal.org/contribution-record?source_link=https%3A//www.drupal.org/node/3584666
_______________________________________________
Security-news mailing list -- security-news AT drupal.org
To unsubscribe send an email to security-news-leave AT drupal.org
Unsubscribe at
- [IT-SecNots] [Security-news] Drupal core - Moderately critical - Gadget Chain - SA-CORE-2026-002, security-news, 15.04.2026
Archiv bereitgestellt durch MHonArc 2.6.19+.