Vulnerabilities & CVEs

Drupal Hackers Strike After Critical Patch Released

Drupal just patched a 'highly critical' SQL injection flaw. Guess what? Hackers are already trying to break in. This isn't good.

Drupal Exploit Found in the Wild Hours After Patch — Threat Digest

Key Takeaways

  • Drupal's critical SQL injection vulnerability (CVE-2026-9082) is actively being exploited in the wild.
  • The flaw specifically affects Drupal sites using PostgreSQL databases, estimated to be less than 5% of installations.
  • Attackers are reportedly conducting reconnaissance and validation attempts, with the potential for data extraction and privilege escalation.
  • Exploitation attempts have been detected within hours of the vulnerability's disclosure and patching.
  • This is the first widely exploited 'highly critical' Drupal vulnerability reported since 2019.

Drupal users, stop reading and patch your sites. Seriously. The Content Management System just disclosed a vulnerability, CVE-2026-9082, and guess what? Attackers aren’t waiting for your coffee to cool. They’re already poking around. This isn’t some abstract theoretical threat. This is live. Exploits are being detected. Now.

The PostgreSQL Pitfall

So, what’s the big deal? It’s an API issue. An API designed to keep your database queries safe. You know, the kind that stops bad actors from shoving malicious commands into your database. SQL injection, that old chestnut. Except this one is tailored for sites using PostgreSQL. Special requests, arbitrary SQL injection. Simple. Effective. Nasty.

This flaw means unauthenticated attackers can do more than just peek. They can pilfer data. They can escalate privileges. In some cases, they can even execute code remotely. All without logging in. Just send a crafted request. Boom.

Drupal’s own prediction was grim: exploit creation within hours or days. They weren’t wrong. The advisory was updated. Risk score bumped. Exploitation attempts detected. In the wild. They use the NIST CMSS scoring system, and this thing is nudging the top.

“A vulnerability in this API allows an attacker to send specially crafted requests, resulting in arbitrary SQL injection for sites using PostgreSQL databases.”

Imperva says they’ve seen over 15,000 attempts targeting nearly 6,000 sites. Across 65 countries. Half of those attacks hit gaming and financial services. Surprise, surprise. These attackers are looking for exposed Drupal sites. Running those vulnerable PostgreSQL configurations. They’re scanning. They’re probing. They’re validating. And once they find a way in, it’s not just about finding the door. It’s about what’s behind it: data extraction, privilege escalation. All the fun stuff.

A Ghost from the Past?

‘Highly critical’ vulnerabilities? In Drupal? We haven’t seen that kind of activity exploited in the wild since 2019. Remember Drupalgeddon and Drupalgeddon2? Headlines were made. Websites were compromised. This new flaw has the stench of history about it. A reminder that even mature systems can have gaping holes. And that time between discovery and weaponization is shrinking. It’s not just Drupal. Cisco’s SD-WAN, Microsoft Exchange, Linux’s ‘Dirty Frag’ – the hits just keep on coming.

The 5% Problem

Drupal powers hundreds of thousands of sites. A lot. But this particular vulnerability? It only hits those using PostgreSQL. Drupal estimates less than 5% of their user base. That’s a small slice, technically. But 5% of hundreds of thousands is still a lot of potential targets. And these are often sites handling sensitive information. Or critical infrastructure. A small percentage is still a big risk when the stakes are this high.

This isn’t just a technical glitch. It’s a wake-up call. For site owners. For developers. For anyone who thought their CMS was just some passive content-delivery system. It’s an active participant in their security. And when it’s vulnerable, the entire operation is.

The fact that exploitation is happening so quickly after a patch is released is the real story here. It tells us a few things. First, the vulnerability was likely discovered by attackers long before Drupal. Second, the exploit code itself is probably simple to develop. And third, the attack infrastructure is ready and waiting. They’re not developing exploits; they’re deploying them. Off the shelf.

It’s a race. The patch is out. But how many people actually applied it before the attackers found them? We’ll likely never know the full extent. But the numbers from Imperva are a grim indicator. The war is on. And Drupal sites running PostgreSQL are on the front lines.

FAQ

Is my Drupal site affected?

Your site is only affected if it uses PostgreSQL as its database and hasn’t been patched for CVE-2026-9082. Drupal estimates less than 5% of sites fall into this category.

Will this lead to data breaches?

Yes, successful exploitation can lead to arbitrary SQL injection, allowing attackers to extract sensitive data, escalate privileges, and potentially execute remote code.

How quickly can I patch?

The patch is available now. It is critical to apply it immediately to protect your site.


🧬 Related Insights

Maya Thompson
Written by

Threat intelligence reporter. Tracks CVEs, ransomware groups, and major breach investigations.

Frequently asked questions

🧬 Related Insights?
- **Read more:** [ShinyHunters' Vishing Ring Eyes Your SaaS Logins – Old Tricks, Bigger Hauls](https://threatdigest.io/article/vishing-for-access-tracking-the-expansion-of-shinyhunters-branded-saas-data-theft/) - **Read more:** [NoVoice Malware's Rampage: 2.3 Million Android Phones Rooted via Google Play](https://threatdigest.io/article/novoice-malwares-rampage-23-million-android-phones-rooted-via-google-play/)

Worth sharing?

Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.

Originally reported by SecurityWeek

Stay in the loop

The week's most important stories from Threat Digest, delivered once a week.