Vulnerability from drupal
Published
2026-02-25 18:47
Modified
2026-02-25 18:47
Summary
Details
This module enables you to protect web forms from automated spam by requiring users to pass a challenge.
The module doesn't sufficiently invalidate used security tokens under certain scenarios, which can lead to the CAPTCHA being bypassed on subsequent submissions.
This vulnerability is mitigated by the fact that an attacker must first successfully solve at least one CAPTCHA manually to harvest the valid tokens.
Credits
Andrew Belcher (andrewbelcher)
www.drupal.org/u/andrewbelcher
Chris Dudley (dudleyc)
www.drupal.org/u/dudleyc
Tim Wood (timwood)
www.drupal.org/u/timwood
tamasd
www.drupal.org/u/tamasd
{
"affected": [
{
"database_specific": {
"affected_versions": "\u003c1.17.0 || \u003e=2.0.0 \u003c 2.0.10"
},
"package": {
"ecosystem": "Packagist:https://packages.drupal.org/8",
"name": "drupal/captcha"
},
"ranges": [
{
"database_specific": {
"constraint": "\u003c1.17.0"
},
"events": [
{
"introduced": "0"
},
{
"fixed": "1.17.0"
}
],
"type": "ECOSYSTEM"
},
{
"database_specific": {
"constraint": "\u003e=2.0.0 \u003c 2.0.10"
},
"events": [
{
"introduced": "2.0.0"
},
{
"fixed": "2.0.10"
}
],
"type": "ECOSYSTEM"
}
],
"severity": []
}
],
"aliases": [
"CVE-2026-3214"
],
"credits": [
{
"contact": [
"https://www.drupal.org/u/andrewbelcher"
],
"name": "Andrew Belcher (andrewbelcher)"
},
{
"contact": [
"https://www.drupal.org/u/dudleyc"
],
"name": "Chris Dudley (dudleyc)"
},
{
"contact": [
"https://www.drupal.org/u/timwood"
],
"name": "Tim Wood (timwood)"
},
{
"contact": [
"https://www.drupal.org/u/tamasd"
],
"name": "tamasd"
}
],
"details": "This module enables you to protect web forms from automated spam by requiring users to pass a challenge.\n\nThe module doesn\u0027t sufficiently invalidate used security tokens under certain scenarios, which can lead to the CAPTCHA being bypassed on subsequent submissions.\n\nThis vulnerability is mitigated by the fact that an attacker must first successfully solve at least one CAPTCHA manually to harvest the valid tokens.",
"id": "DRUPAL-CONTRIB-2026-015",
"modified": "2026-02-25T18:47:57.000Z",
"published": "2026-02-25T18:47:57.000Z",
"references": [
{
"type": "WEB",
"url": "https://www.drupal.org/sa-contrib-2026-015"
}
],
"schema_version": "1.7.0"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…