Date: 
Wednesday, Apr 22nd, 2026
Advisory ID: 
BACKDROP-SA-CORE-2026-004
Security risk: 
Not Critical
Vulnerabilities: 
  • Access bypass
  • Arbitrary PHP code execution
Versions affected: 
  • Backdrop Core 1.33.x versions prior to 1.33.2
  • Backdrop Core 1.32.x versions prior to 1.32.3
  • Backdrop versions 1.31 and prior do not receive security coverage.
Description: 

Backdrop allows administrators to upload certain files that could be executable. The vulnerability is mitigated by the fact that it requires administrator level access, and in most server configurations, execution of uploaded files is disabled by the server or the .htaccess files created by Backdrop. In the most recent release, a hardening of file types that may not be uploaded and directories that may not be uploaded to will help prevent administrators from accidentally writing into system directories. The list of unsafe extensions is expanded significantly to further reduce the chances of uploaded files from being executed.

Because this configuration already requires administrator-level permissions, the improvements in the latest release is considered a security hardening and not exploitable by unprivileged user accounts.

Solution: 

Upgrade your site to the most recent version of Backdrop core. Download the latest release from the Backdrop CMS Releases or use the built-in updater to self-update. See the update instructions, if needed.

Reported By: 
  • Jean-Nicolas Turbis
Fixed By: 
Coordinated By: 

Security email list

Backdrop maintains a security mailing list. Whenever a security release comes out, an email will be sent to everyone subscribed to that list, announcing the new release. Please follow the steps below to join the Security email list.

  1. Log in to backdropcms.org
  2. Edit your profile
  3. Switch to the "Subscriptions" tab
  4. Check the box labeled "Security updates"
  5. Save the form