TROYANOSYVIRUS
Back to CVEs

CVE-2019-6340

HIGHCISA KEV
8.1

Description

Some field types do not properly sanitize data from non-form sources in Drupal 8.5.x before 8.5.11 and Drupal 8.6.x before 8.6.10. This can lead to arbitrary PHP code execution in some cases. A site is only affected by this if one of the following conditions is met: The site has the Drupal 8 core RESTful Web Services (rest) module enabled and allows PATCH or POST requests, or the site has another web services module enabled, like JSON:API in Drupal 8, or Services or RESTful Web Services in Drupal 7. (Note: The Drupal 7 Services module itself does not require an update at this time, but you should apply other contributed updates associated with this advisory if Services is in use.)

CVE Details

CVSS v3.1 Score8.1
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityHIGH
Privileges RequiredNONE
User InteractionNONE
Published2/21/2019
Last Modified11/7/2025
Sourcekev
Honeypot Sightings0

CISA KEV

VendorDrupal
ProductCore
Vulnerability NameDrupal Core Remote Code Execution Vulnerability
KEV Date Added2022-03-25
Remediation Due Date2022-04-15
Ransomware UseUnknown

Affected Products

drupal:drupal

Weaknesses (CWE)

CWE-502CWE-502

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.