Drupal, the popular content management system, has issued a security advisory SA-CORE-2023-005 to fix an access bypass vulnerability that impacts multiple versions of the software.
The vulnerability allows attackers to take control of an affected system, putting users’ data and privacy at risk. The Drupal security team urges users and administrators to review the advisory and apply the necessary updates as soon as possible to prevent exploitation.
The access bypass vulnerability is caused by insufficient validation of access restrictions under certain configurations. Drupal versions affected include Drupal 9.1.x, Drupal 9.0.x, Drupal 8.9.x, Drupal 8.8.x, and Drupal 7.x.
According to Drupal, the vulnerability is being actively exploited in the wild. Therefore, it’s critical to take immediate action to mitigate the risk.
CISA, the Cybersecurity and Infrastructure Security Agency, has also urged Drupal users and administrators to review the security advisory and apply the necessary updates. CISA’s warning highlights the seriousness of the issue and the need for prompt action to avoid the possibility of attackers exploiting the vulnerability to gain unauthorized access to the Drupal systems.
CISA advises users and administrators to enable automatic updates, if available, or to update to the latest version of Drupal as soon as possible.
In conclusion, the access bypass vulnerability in Drupal poses a significant risk to users’ privacy and security. The vulnerability is being actively exploited, and users must take immediate action to apply the necessary updates.
It is highly recommended that Drupal users and administrators review the security advisory SA-CORE-2023-005 and take prompt action to mitigate the risk of exploitation.