Backdrop core - Not Critical - Access Bypass - BACKDROP-SA-CORE-2026-004

Date: 
Apr 22nd, 2026
Security risk: 
Not Critical
Vulnerabilities: 
  • Access bypass
  • Arbitrary PHP code execution

Backdrop allows administrators to upload certain files that could be executable. The vulnerability is mitigated by the fact that it requires administrator level access, and in most server configurations, execution of uploaded files is disabled by the server or the .htaccess files created by Backdrop. In the most recent release, a hardening of file types that may not be uploaded and directories that may not be uploaded to will help prevent administrators from accidentally writing into system directories. The list of unsafe extensions is expanded significantly to further reduce the chances of uploaded files from being executed.

Because this configuration already requires administrator-level permissions, the improvements in the latest release is considered a security hardening and not exploitable by unprivileged user accounts.

Advisory ID: 
BACKDROP-SA-CORE-2026-004
Versions affected: 
  • Backdrop Core 1.33.x versions prior to 1.33.2
  • Backdrop Core 1.32.x versions prior to 1.32.3
  • Backdrop versions 1.31 and prior do not receive security coverage.

Backdrop core - Access Bypass - BACKDROP-SA-CORE-2026-003

Date: 
Apr 22nd, 2026
Security risk: 
Moderately Critical
Vulnerability: 
Access bypass

Backdrop bulk operations did not always check permissions appropriately. This could allow someone with permission to use bulk operations generally to use bulk operations on the file management page and delete files that they did not have specific permission to delete. This vulnerability is mitigated by the fact that the user must have the Access the manage files overview permission.

Advisory ID: 
BACKDROP-SA-CORE-2026-003
Versions affected: 
  • Backdrop Core 1.33.x versions prior to 1.33.2
  • Backdrop Core 1.32.x versions prior to 1.32.3
  • Backdrop versions 1.31 and prior do not receive security coverage.

Backdrop core - Critical - Cross Site Request Forgery - BACKDROP-SA-CORE-2026-002

Date: 
Apr 22nd, 2026
Security risk: 
Critical
Vulnerability: 
Cross Site Request Forgery

Backdrop's project installer does not check against a generated token before queuing projects to be downloaded from the Backdrop contrib repository. A user that has permission to post content could craft special tag to queue projects and download the projects. This vulnerability is mitigated by the fact that the user needs the ability to post HTML, and needs to get a privileged user to view the content they post. Additionally, there is no known way to enable projects, only download them.

Advisory ID: 
BACKDROP-SA-CORE-2026-002
Versions affected: 
  • Backdrop Core 1.33.x versions prior to 1.33.2
  • Backdrop Core 1.32.x versions prior to 1.32.3
  • Backdrop versions 1.31 and prior do not receive security coverage.

Backdrop core - Critical - Cross-site scripting - BACKDROP-SA-CORE-2026-001

Date: 
Apr 22nd, 2026
Security risk: 
Critical
Vulnerability: 
Cross Site Scripting

Backdrop core's jQuery integration for AJAX modal dialog boxes does not sufficiently sanitize certain options, which can lead to a cross-site scripting (XSS) vulnerability.

Advisory ID: 
BACKDROP-SA-CORE-2026-001
Versions affected: 
  • Backdrop Core 1.33.x versions prior to 1.33.2
  • Backdrop Core 1.32.x versions prior to 1.32.3

Backdrop versions 1.31 and prior do not receive security coverage.

Protected Pages - Moderately critical - Access bypass - BACKDROP-SA-CONTRIB-2025-016

Date: 
Aug 29th, 2025
Security risk: 
Moderately Critical
Vulnerability: 
Access bypass

The Protected Pages module module allows you to protect individual pages with a password.

The module doesn't limit the number of password attempts, making it vulnerable to brute force attacks.

This vulnerability is mitigated by the fact that an attacker must know the protected page's URL.

Advisory ID: 
BACKDROP-SA-CONTRIB-2025-016
Versions affected: 
  • Protected pages module, all versions prior to 1.x-2.4.1.

Module filter - Less Critical - Third Party Libraries - BACKDROP-SA-CONTRIB-2025-015

Date: 
Aug 25th, 2025
Security risk: 
Less Critical
Vulnerability: 
Third Party Libraries

Module filter module included an older version of the jQuery BBQ library, which contained a security vulnerability.

The risk may be mitigated by users needing to have access to this module that would be restricted to the administrator role.

 

Note: Backdrop security releases are usually made on Wednesdays. This release was accidentally created out of band.

 

Advisory ID: 
BACKDROP-SA-CONTRIB-2025-015
Versions affected: 
  • All module filter versions prior to 1.x-2.2.3

GLightbox - Moderately Critical - Cross Site Scripting - BACKDROP-SA-CONTRIB-2025-014

Date: 
Jun 26th, 2025
Security risk: 
Moderately Critical
Vulnerability: 
Cross Site Scripting

GLightbox module provides integration with the GLightbox library, a JavaScript lightbox for images.

The module doesn't sufficiently sanitize text provided to the GLightbox JavaScript library, leading to a Cross Site Scripting (XSS) vulnerability.

This vulnerability is mitigated by the fact that an attacker must have a role with the permissions to edit content that is configured to support the Glightbox library.

Advisory ID: 
BACKDROP-SA-CONTRIB-2025-014
Versions affected: 
  • GLightbox all versions prior to 1.x-1.0.3

GDPR Cookies - Less critical - Cross Site Scripting - SA-CONTRIB-2025-013

Date: 
May 6th, 2025
Security risk: 
Less Critical
Vulnerability: 
Cross Site Scripting

GDPR Cookies is a module that helps to meet GDPR requirements by blocking third party services that set cookies unless and until the user consents. 

The module doesn't sufficiently protect visitors from Cross Site Scripting if a malicious value has been provided for the optional 'Info content' field for the YouTube service.

This vulnerability is mitigated by the fact that an attacker must have a role with the permission "Create a GDPR Cookies Service" or "Edit any GDPR Cookies Service", and a site must have added a YouTube service as configuration. 

 

A CVE has been requested, and this page will be updated as soon as an official number has been issued.

Advisory ID: 
SA-CONTRIB-2025-013
Versions affected: 
  • GDPR Cookies all versions prior to 1.x-1.3.5

Colorbox - Moderately critical - Cross Site Scripting - SA-CONTRIB-2025-012

Date: 
Apr 23rd, 2025
Security risk: 
Moderately Critical
Vulnerability: 
Cross Site Scripting

Colorbox is a module that allows Images, and iframed or inline content to be displayed in a modal above the current page.

The Colorbox module doesn't sufficiently sanitize data attributes before opening modals.

This vulnerability is mitigated by the fact that an attacker must have a role with permission to enter HTML tags containing specific data attributes.

 

Advisory ID: 
BACKDROP-SA-CONTRIB-2025-012
Versions affected: 
  • Colorbox all versions prior to 1.x-2.17.3

Flag - Moderately critical - Cross Site Scripting - BACKDROP-SA-CONTRIB-2025-011

Date: 
Apr 16th, 2025
Security risk: 
Moderately Critical
Vulnerability: 
Cross Site Scripting

Flag module allows flags to be added to nodes, comments, users, and any other type of entity.

The module doesn't verify flag links before performing the flag action, or verify that the response returned was provided by the flag module. This can allow specially crafted HTML to result in Cross Site Scripting.

This vulnerability is mitigated by the fact that an attacker must have a role with permission to create links on the website, for example: create or edit comments or content with a filtered text format.

 

Advisory ID: 
BACKDROP-SA-CONTRIB-2025-011
Versions affected: 
  • Flag versions prior to 1.x-3.6.2

Pages