Drupal 8.9.19, 9.1.13, and 9.2.6 released with several security fixes

Published On16 Sep 2021

SA-CORE-2021-006 through SA-CORE-2021-010
Drupal core maintainers have released three new Drupal core releases in Drupal 8.9.x, 9.1.x, and 9.2.x series that fix several security vulnerabilities.

Drupal, the popular open-source content management system software written in PHP, has four version branches that receive security updates: 7.x, 8.9.x, 9.1, and 9.2. Among these versions, 9.2 is the active and recommended branch for new projects, however, all four branches are covered by Drupal security coverage.

All Drupal 8.x versions prior to Drupal 8.9.x and Drupal 9.x versions prior to Drupal 9.1.x are not covered by Drupal security coverage, and no longer receive security updates, and may be vulnerable.


Released Security Updates

Drupal 7.x versions are not affected by this security update.

Fixed Vulnerabilities

This security update fixes several vulnerabilities in the bundled JSON:API, Media, and QuickEdit modules.

  • Media module: Fixes a cross-site request forgery vulnerability that a user with permission to embed media could inject HTML.
    CVE ID: CVE-2020-13673 / Drupal.org: SA-CORE-2021-006

  • QuickEdit module: Fixes a cross-site request forgery vulnerability where the module did not properly validate its URI endpoints.
    CVE ID: CVE-2020-13674 / Drupal.org: SA-CORE-2021-007

  • JSON:API module: When used along with the REST/File module, this security fixes a prior access bypass vulnerability that might allow an attacker to allow upload files bypassing the validation rules.
    CVE ID: CVE-2020-13675 / Drupal.org: SA-CORE-2021-008

  • QuickEdit module: Fixes an access bypass vulnerability that the access to fields were not validated in certain circumstances.
    CVE ID: CVE-2020-13676 / Drupal.org: SA-CORE-2021-009.

  • JSON:API module: Fixes an access bypass vulnerability that the module also did not properly check the field access in certain circumstances.
    CVE ID: CVE-2020-13677 / Drupal.org: SA-CORE-2021-010.

Mitigation Factors

Only sites that use the modules mentioned above are affected. Note that QuickEdit module is enabled by default with the Drupal standard installation profile. Disabling and uninstalling the modules can prevent the security vulnerability if the sites cannot be updated immediately.

In other news on PHP.Watch

All NewsFeed
PHP 8.3 Released!

PHP 8.3 Released!

PHP 8.3 was released today, containing over 1,000 commits from over 100 contributors.
First PHP 8.3 Release Candidate is now available for testing

First PHP 8.3 Release Candidate is now available for testing

The first release candidate (RC1) for PHP 8.3 is now released, along with Windows QA builds and Docker images.
PHP 8.3 Beta Released

PHP 8.3 Beta Released

The first beta release of the upcoming PHP 8.3 is released.
Subscribe to PHP.Watch newsletter for monthly updates

You will receive an email on last Wednesday of every month and on major PHP releases with new articles related to PHP, upcoming changes, new features and what's changing in the language. No marketing emails, no selling of your contacts, no click-tracking, and one-click instant unsubscribe from any email you receive.