CVE-2025-13081

Nov. 19, 2025, 7:14 p.m.

5.9
Medium

Description

Improperly Controlled Modification of Dynamically-Determined Object Attributes vulnerability in Drupal Drupal core allows Object Injection.This issue affects Drupal core: from 8.0.0 before 10.4.9, from 10.5.0 before 10.5.6, from 11.0.0 before 11.1.9, from 11.2.0 before 11.2.8.

Product(s) Impacted

Vendor Product Versions
Drupal
  • Drupal Core
  • 8.0.0-10.4.9, 10.5.0-10.5.6, 11.0.0-11.1.9, 11.2.0-11.2.8

Weaknesses

Common security weaknesses mapped to this vulnerability.

CWE-502
Deserialization of Untrusted Data
The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid.
CWE-915
Improperly Controlled Modification of Dynamically-Determined Object Attributes
The product receives input from an upstream component that specifies multiple attributes, properties, or fields that are to be initialized or updated in an object, but it does not properly control which attributes can be modified.

*CPE(s)

Affected systems and software identified for this CVE.

Type Vendor Product Version Update Edition Language Software Edition Target Software Target Hardware Other Information
a drupal drupal_core 8.0.0-10.4.9 / / / / / / /
a drupal drupal_core 10.5.0-10.5.6 / / / / / / /
a drupal drupal_core 11.0.0-11.1.9 / / / / / / /
a drupal drupal_core 11.2.0-11.2.8 / / / / / / /

CVSS Score

5.9 / 10

CVSS Data - 3.1

  • Attack Vector: NETWORK
  • Attack Complexity: HIGH
  • Privileges Required: HIGH
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: NONE
  • CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N

    View Vector String

Timeline

Published: Nov. 18, 2025, 5:15 p.m.
Last Modified: Nov. 19, 2025, 7:14 p.m.

Status : Awaiting Analysis

CVE has been recently published to the CVE List and has been received by the NVD.

More info

Source

mlhess@drupal.org

*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.