Drupal 8.9.19, 9.1.13, and 9.2.6 released with several security fixes
Drupal core maintainers have released three new Drupal core releases in Drupal 8.9.x, 9.1.x, and 9.2.x series that fix several security vulnerabilities.
Drupal, the popular open-source content management system software written in PHP, has four version branches that receive security updates: 7.x, 8.9.x, 9.1, and 9.2. Among these versions, 9.2 is the active and recommended branch for new projects, however, all four branches are covered by Drupal security coverage.
All Drupal 8.x versions prior to Drupal 8.9.x and Drupal 9.x versions prior to Drupal 9.1.x are not covered by Drupal security coverage, and no longer receive security updates, and may be vulnerable.
Released Security Updates
- Drupal 9.2.6 for Drupal 9.2 branch
- Drupal 9.1.13 for Drupal 9.1 branch
- Drupal 8.9.19 for Drupal 8.9 branch
Drupal 7.x versions are not affected by this security update.
This security update fixes several vulnerabilities in the bundled JSON:API, Media, and QuickEdit modules.
Media module: Fixes a cross-site request forgery vulnerability that a user with permission to embed media could inject HTML.
CVE ID: CVE-2020-13673 / Drupal.org: SA-CORE-2021-006
QuickEdit module: Fixes a cross-site request forgery vulnerability where the module did not properly validate its URI endpoints.
CVE ID: CVE-2020-13674 / Drupal.org: SA-CORE-2021-007
JSON:API module: When used along with the REST/File module, this security fixes a prior access bypass vulnerability that might allow an attacker to allow upload files bypassing the validation rules.
CVE ID: CVE-2020-13675 / Drupal.org: SA-CORE-2021-008
QuickEdit module: Fixes an access bypass vulnerability that the access to fields were not validated in certain circumstances.
CVE ID: CVE-2020-13676 / Drupal.org: SA-CORE-2021-009.
JSON:API module: Fixes an access bypass vulnerability that the module also did not properly check the field access in certain circumstances.
CVE ID: CVE-2020-13677 / Drupal.org: SA-CORE-2021-010.
Only sites that use the modules mentioned above are affected. Note that QuickEdit module is enabled by default with the Drupal standard installation profile. Disabling and uninstalling the modules can prevent the security vulnerability if the sites cannot be updated immediately.