
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability CVE-2023-31250 affects Drupal's file download facility, which was discovered to have insufficient sanitization of file paths in certain situations. This security issue was disclosed on April 26, 2023, affecting multiple versions of Drupal including versions 7.0 through 7.96, 9.4 through 9.4.14, 9.5 through 9.5.8, and 10.0 through 10.0.8 (NVD).
The vulnerability has been assigned a CVSS v3.1 base score of 6.5 (Medium), with the following vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N. The vulnerability is classified under CWE-863 (Incorrect Authorization), indicating an authorization-related security flaw. The issue stems from insufficient path sanitization in the file download functionality, which could potentially allow users to access private files that should be restricted (NVD).
The primary impact of this vulnerability is that it may allow users to gain unauthorized access to private files that they should not have permission to access. This could lead to information disclosure of sensitive data stored in private files within Drupal installations (NVD).
Sites are advised to update to the latest version of their respective Drupal branches. Some sites may require configuration changes following the security release. Users should review the release notes for their specific Drupal version if they experience issues accessing private files after updating (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."