Loading HuntDB...

GHSA-6955-67hm-vjjq

GitHub Security Advisory

Drupal core arbitrary PHP code execution

✓ GitHub Reviewed HIGH Has CVE

Advisory Details

Drupal core sanitizes filenames with dangerous extensions upon upload and strips leading and trailing dots from filenames to prevent uploading server configuration files.

However, the protections for these two vulnerabilities previously did not work correctly together. As a result, if the site were configured to allow the upload of files with an htaccess extension, these files' filenames would not be properly sanitized. This could allow bypassing the protections provided by Drupal core's default .htaccess files and possible remote code execution on Apache web servers.

This issue is mitigated by the fact that it requires a field administrator to explicitly configure a file field to allow htaccess as an extension (a restricted permission), or a contributed module or custom code that overrides allowed file uploads.

Affected Packages

Packagist drupal/core
Affected versions: 8.0.0 (fixed in 9.3.19)
Packagist drupal/core
Affected versions: 9.4.0 (fixed in 9.4.3)

Related CVEs

Key Information

GHSA ID
GHSA-6955-67hm-vjjq
Published
August 6, 2022 9:33 AM
Last Modified
May 10, 2023 12:36 AM
CVSS Score
7.5 /10
Primary Ecosystem
Packagist
Primary Package
drupal/core
GitHub Reviewed
✓ Yes

Dataset

Last updated: June 18, 2025 6:25 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.