Vulnerabilities & CVEs

Drupal Critical Security Update for High Exploit Risk Bug

Drupal is scrambling to push a critical security update. A bug with a high exploitation risk means threat actors could have exploits ready within hours of disclosure. Your website might be next.

Drupal logo with a warning symbol

Key Takeaways

  • Drupal is releasing a critical security update today for a vulnerability with high exploitation risk.
  • Threat actors could develop exploits within hours of the update's public disclosure.
  • Administrators on Drupal versions 8 and later are urged to update immediately.
  • Specific patch versions are provided for a range of Drupal 10 and 11 releases, as well as end-of-life versions.

So, Drupal just announced a ‘core security release’ is dropping later today. And by ‘dropping’, they mean you better clear your calendar because threat actors might have exploits cooking within hours of this thing going public. Fun.

Administrators are being told to pencil in time for core updates between 17:00 and 21:00 UTC on May 20th. Apparently, if you’re still clinging to Drupal versions 8 or 9, you’re strongly advised to jump to at least version 10.6. Because, you know, the internet waits for no one, especially not someone trying to patch their CMS.

For those keeping score at home, Drupal’s CMS is pretty damn popular. We’re talking big corporations, government agencies, schools, hospitals – basically, places that hold a lot of sensitive data and usually have the budget to keep things patched, but sometimes… well, sometimes things slip through.

The vulnerability, as it stands, apparently affects Drupal core versions 8 and up. But, and there’s always a ‘but’, they’re saying not all configurations are actually hammered. Still, better safe than sorry, right? Updates are coming for a laundry list of versions:

  • Drupal 11.3.x
  • Drupal 11.2.x
  • Drupal 11.1x
  • Drupal 10.6.x
  • Drupal 10.5.x
  • Drupal 10.4x

Here’s the kicker: even though versions 11.1x and 10.4x are officially out to pasture, they’re still tossing out fixes for them. That tells you something about the severity. You’ll need to get to Drupal 11.1.9 and 10.4.9, respectively.

And what about those ancient relics, Drupal 8 and 9? End-of-life, baby. No patches. But, in a rare moment of charity, they will be publishing hotfix files for versions 9.5 and 8.9 if you’re running 9.5.11 or 8.9.20. Consider it a digital lifeline.

Drupal Steward users? You’re supposedly already covered against known attack vectors. Still, they’re recommending an update. Because even if you’re protected, why wouldn’t you update when the whole world is holding its breath?

What’s particularly frustrating, and frankly, a little alarming, is that they’re keeping all the technical details locked down. They’re even warning that any info you see online now could be fake, designed to send you down a rabbit hole of risky actions. So, yeah, proceed with caution. Extremely high caution.

“Neither the Security Team nor any other party is able to release any more information about this vulnerability until the announcement is made,” warned Drupal.

This whole song and dance is a familiar one in the tech world. A critical vulnerability gets whispered about, the vendor scrambles, and users are left in the dark, nervously watching the clock. It’s a constant game of whack-a-mole, and the attackers are often the ones holding the hammer.

My unique insight here? This isn’t just about Drupal. It’s about the illusion of stability in software we rely on for everything from banking to government services. We build these complex systems, and then we cross our fingers, hoping the foundational code doesn’t have a gaping hole that someone’s already figuring out how to drive a truck through. Who’s making money here? The folks developing the exploits, that’s who. And maybe, eventually, the security firms selling solutions to fix the mess.

So, keep an eye on Drupal’s official security portal. Get ready to hit that update button the second it’s available. Because in this business, ‘later’ can easily become ‘too late’.

Why is this update so urgent?

Drupal explicitly states that threat actors may be able to develop exploits within hours of the update disclosure. This means the window for potential attacks is extremely narrow, and prompt patching is crucial to prevent compromise.

Who needs to apply this Drupal security update?

Website administrators using Drupal core versions 8 and later are strongly advised to apply the update. Specific versions will receive fixes, but the overarching recommendation is to upgrade to the latest supported versions whenever possible.


🧬 Related Insights

Maya Thompson
Written by

Threat intelligence reporter. Tracks CVEs, ransomware groups, and major breach investigations.

Worth sharing?

Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.

Originally reported by Bleeping Computer

Stay in the loop

The week's most important stories from Threat Digest, delivered once a week.