The QuickEdit module does not properly validate access to routes, which could allow cross-site request forgery under some circumstances and lead to possible data integrity issues. Sites are only affected if the QuickEdit module (which comes with the Standard profile) is installed. Removing the "access in-place editing" permission from untrusted users will not fully mitigate the vulnerability.
References
Link | Resource |
---|---|
https://www.drupal.org/sa-core-2021-007 | Patch Vendor Advisory |
https://www.drupal.org/sa-core-2021-007 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:01
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.drupal.org/sa-core-2021-007 - Patch, Vendor Advisory |
18 Feb 2022, 01:42
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 4.3
v3 : 6.5 |
CPE | cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:* | |
CWE | CWE-352 | |
References | (CONFIRM) https://www.drupal.org/sa-core-2021-007 - Patch, Vendor Advisory |
11 Feb 2022, 16:48
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-02-11 16:15
Updated : 2024-11-21 05:01
NVD link : CVE-2020-13674
Mitre link : CVE-2020-13674
CVE.ORG link : CVE-2020-13674
JSON object : View
Products Affected
drupal
- drupal
CWE
CWE-352
Cross-Site Request Forgery (CSRF)