Vulnerability from drupal
Published
2026-01-14 17:54
Modified
2026-01-14 17:54
Summary
Details
This module allows site administrators to grant specific roles the authority to assign selected roles to users, without them needing the "administer permissions" permission.
The module contains an access bypass vulnerability when used in combination with the Views Bulk Operations module. A user with the ability to delegate a role is also able to assign the administrator role, including to their own user.
This vulnerability is mitigated by the fact that an attacker must have access to a view of users with the Views Bulk Operations module enabled.
Credits
Drew Webber (mcdruid)
www.drupal.org/u/mcdruid
{
"affected": [
{
"database_specific": {
"affected_versions": "\u003e=1.3.0 \u003c1.5.0"
},
"package": {
"ecosystem": "Packagist:https://packages.drupal.org/8",
"name": "drupal/role_delegation"
},
"ranges": [
{
"database_specific": {
"constraint": "\u003e=1.3.0 \u003c1.5.0"
},
"events": [
{
"introduced": "1.3.0"
},
{
"fixed": "1.5.0"
}
],
"type": "ECOSYSTEM"
}
],
"severity": []
}
],
"aliases": [
"CVE-2026-0945"
],
"credits": [
{
"contact": [
"https://www.drupal.org/u/mcdruid"
],
"name": "Drew Webber (mcdruid)"
}
],
"details": "This module allows site administrators to grant specific roles the authority to assign selected roles to users, without them needing the \"administer permissions\" permission.\n\nThe module contains an access bypass vulnerability when used in combination with the Views Bulk Operations module. A user with the ability to delegate a role is also able to assign the administrator role, including to their own user.\n\nThis vulnerability is mitigated by the fact that an attacker must have access to a view of users with the Views Bulk Operations module enabled.",
"id": "DRUPAL-CONTRIB-2026-002",
"modified": "2026-01-14T17:54:33.000Z",
"published": "2026-01-14T17:54:33.000Z",
"references": [
{
"type": "WEB",
"url": "https://www.drupal.org/sa-contrib-2026-002"
}
],
"schema_version": "1.7.0"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…