CVE-2022-25273

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-25273
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-25273.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-25273
Aliases
Related
Published
2023-04-26T14:15:09Z
Modified
2024-09-03T04:13:06.204390Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
[none]
Details

Drupal core's form API has a vulnerability where certain contributed or custom modules' forms may be vulnerable to improper input validation. This could allow an attacker to inject disallowed values or overwrite data. Affected forms are uncommon, but in certain cases an attacker could alter critical or sensitive data.

References

Affected packages

Git / github.com/drupal/drupal

Affected ranges

Type
GIT
Repo
https://github.com/drupal/drupal
Events

Affected versions

8.*

8.0.0
8.1.0-beta1

9.*

9.0.0-alpha1
9.0.0-alpha2
9.2.0
9.2.0-alpha1
9.2.0-beta1
9.2.0-beta2
9.2.0-beta3
9.2.0-rc1
9.2.1
9.2.10
9.2.11
9.2.12
9.2.13
9.2.14
9.2.15
9.2.16
9.2.17
9.2.2
9.2.3
9.2.4
9.2.5
9.2.6
9.2.7
9.2.8
9.2.9