CVE-2016-6211
high-risk
Published 2016-09-09
The User module in Drupal 7.x before 7.44 allows remote authenticated users to gain privileges via vectors involving contributed or custom code that triggers a rebuild of the user profile form.
Do I need to act?
~
1.1% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.8/10
High
NETWORK
/ LOW complexity
Affected Products (20)
References (10)
Third Party Advisory
http://www.debian.org/security/2016/dsa-3604
Vendor Advisory
https://www.drupal.org/SA-CORE-2016-002
Third Party Advisory
http://www.debian.org/security/2016/dsa-3604
Vendor Advisory
https://www.drupal.org/SA-CORE-2016-002
60
/ 100
high-risk
Severity
30/34 · Critical
Exploitability
3/34 · Minimal
Exposure
27/34 · High