Post

Drupal Admins Rush to Patch Critical SQL Injection Vulnerability

Drupal Admins Rush to Patch Critical SQL Injection Vulnerability

Urgent Security Update for Drupal Admins 🚨

Administrators of the Drupal open-source content management platform are rushing to install an emergency patch issued today to fix a highly critical SQL injection vulnerability in the application’s core. The vulnerability, identified as CVE-2026-9082, exists in a database abstraction API that ensures queries against the database are sanitized to prevent SQL injection attacks.

In its warning, Drupal stated that this vulnerability allows an attacker to send specially crafted requests, resulting in arbitrary SQL injection for sites using PostgreSQL databases. This can lead to information disclosure, and in some cases, privilege escalation, remote code execution (RCE), or other attacks. The vulnerability can be exploited by anonymous users. The Drupal Security Team has urged admins to reserve time for the updates on May 20, as exploits might be developed within hours or days.

While the vulnerability only affects websites using the PostgreSQL database, there may be upstream issues with Symfony and Twig, which are essential components used by Drupal. Consequently, Twig has been updated to version 3.26.0, and Symfony has issued a series of security advisories. As a result, Drupal urges admins using these applications to update them as well, regardless of whether the SQL injection vulnerability affects their systems.

Robert Enderle, a consultant who heads the Enderle Group, emphasized, “Don’t ignore it if you aren’t on PostgreSQL. Even if IT is running MySQL or SQLite and thinks they are safe from the main Drupal bug, they still must apply the update. This release includes critical upstream security fixes for Symfony and Twig dependencies that affect all environments.”

The Drupal patches cover supported branches 11.3, 11.2, 10.6, and 10.5. Admins are advised to update Drupal Core immediately based on the currently supported branch. Versions below 11.1.x, 11.0.x, and 10.4.x are end of life and are ineligible for official fixes. However, due to the flaw’s severity, Drupal will shortly issue unsupported patches as a best effort. Users of any version of Drupal 9 can try manually applying the Drupal 9.5 patch, while users of Drupal 8.9 can attempt the Drupal 8.9 patch.

Additionally, Enderle advised admins to lock down access permissions. Due to the Twig vulnerabilities, IT needs to audit who has the ability to update Twig templates via Views or other modules and restrict that access to trusted admins only. He also urged admins to examine their PostgreSQL and web application firewall logs for any suspicious activity or unusual SQL queries leading up to this patch.

Fritz Jean-Louis, principal cybersecurity advisor at Info-Tech Research Group, agreed that Drupal admins need to act immediately, as the vulnerability can be exploited by anyone with the technical knowledge to send a specially crafted query to a Postgres database.

For more detailed information, please read the full article here: Read full article

This post is licensed under CC BY 4.0 by the author.