This page displays all public Tag1 D7ES Security Advisories. Check out our Announcements page for all updates.

You can filter this list by project or subscribe to the RSS feed.

 

OpenID Connect - Moderately Critical - Server Side Request Forgery

Date
Severity
Moderately Critical
Affected versions
<7.x-1.4
The OpenID Connect module contained a Server Side Request Forgery (SSRF) vulnerability in its user picture handling functionality, allowing attackers to force the server to make HTTP requests to arbitrary URLs through malicious user picture URLs.

OpenID Connect - Moderately Critical - Access Bypass

Date
Severity
Moderately Critical
Affected versions
<7.x-1.4
The OpenID Connect module introduced a prompt parameter configuration that, when misconfigured, could potentially weaken authentication security by allowing users to bypass certain authentication requirements through OpenID Connect identity providers.

OpenID Connect - Less Critical - Email Uniqueness Validation

Date
Severity
Moderately Critical
Affected versions
<7.x-1.4
The OpenID Connect module contained an email uniqueness validation vulnerability that allowed duplicate user accounts to be created with email addresses that differ only in case, potentially leading to account confusion and authentication bypass scenarios.

Taxonomy Term Reference Tree Widget - Moderately Critical - Cross Site Scripting

Date
Severity
Moderately Critical
Affected versions
<7.x-1.12
The Term Reference Tree Widget module contained a Cross-Site Scripting (XSS) vulnerability in its tree list output function, allowing malicious users to inject JavaScript code through unsanitized token replacement and improper URI handling.