Some field types do not properly sanitize data from non-form sources in Drupal 8.5.x before 8.5.11 and Drupal 8.6.x before 8.6.10. This can lead to arbitrary PHP code execution in some cases. A site is only affected by this if one of the following conditions is met: The site has the Drupal 8 core RESTful Web Services (rest) module enabled and allows PATCH or POST requests, or the site has another web services module enabled, like JSON:API in Drupal 8, or Services or RESTful Web Services in Drupal 7. (Note: The Drupal 7 Services module itself does not require an update at this time, but you should apply other contributed updates associated with this advisory if Services is in use.)
Metrics
Affected Vendors & Products
References
History
Fri, 07 Feb 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_0
|
Fri, 07 Feb 2025 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: drupal
Published:
Updated: 2025-02-07T12:38:51.309Z
Reserved: 2019-01-15T00:00:00.000Z
Link: CVE-2019-6340

Updated: 2024-08-04T20:16:24.806Z

Status : Analyzed
Published: 2019-02-21T21:29:00.343
Modified: 2025-02-07T14:55:30.370
Link: CVE-2019-6340

No data.