Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0748: CWE-284 Improper Access Control in Drupal Internationalization (i18n) - i18n_node submodule

0
Medium
VulnerabilityCVE-2026-0748cvecve-2026-0748cwe-284
Published: Thu Mar 26 2026 (03/26/2026, 21:17:37 UTC)
Source: CVE Database V5
Vendor/Project: Drupal
Product: Internationalization (i18n) - i18n_node submodule

Description

CVE-2026-0748 is a medium severity vulnerability in the Drupal 7 Internationalization (i18n) module's i18n_node submodule. It allows users with both 'Translate content' and 'Administer content translations' permissions to bypass access controls and view unpublished node titles and IDs through the translation UI and autocomplete widget. This improper access control issue affects versions 7. x-1. 0 through 7. x-1. 35. Exploitation does not require user interaction or authentication beyond the specified permissions. While it does not disclose full unpublished content, the exposure of node metadata can aid attackers in reconnaissance or unauthorized content manipulation. No known public exploits exist yet, but organizations using affected Drupal versions should review user permissions and apply patches when available.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/26/2026, 22:00:22 UTC

Technical Analysis

CVE-2026-0748 is an improper access control vulnerability (CWE-284) found in the Drupal 7 Internationalization (i18n) module, specifically within the i18n_node submodule. This submodule facilitates content translation management in Drupal sites. The flaw arises because users granted both 'Translate content' and 'Administer content translations' permissions can leverage the translation user interface and its autocomplete widget to view and attach unpublished nodes, which should normally be restricted. This bypasses intended access controls, resulting in unauthorized disclosure of unpublished node titles and node IDs. The vulnerability affects all versions from 7.x-1.0 up to and including 7.x-1.35. The issue does not require additional user interaction or elevated privileges beyond the specified permissions, and it can be exploited remotely over the network. Although the vulnerability does not expose full unpublished content or allow modification, the leakage of unpublished node metadata can facilitate further attacks such as targeted content manipulation or information gathering. No public exploits have been reported to date. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required beyond the stated permissions, no user interaction, and low impact on confidentiality with no impact on integrity or availability. This vulnerability highlights the importance of strict access control enforcement in content management systems, especially in modules handling translations and unpublished content.

Potential Impact

The primary impact of CVE-2026-0748 is the unauthorized disclosure of unpublished node titles and IDs, which compromises confidentiality. Organizations using Drupal 7 with the affected i18n_node submodule may inadvertently expose sensitive or draft content metadata to users who should not have access. This information leakage can aid attackers or malicious insiders in reconnaissance activities, enabling them to identify unpublished content for targeted attacks, social engineering, or content manipulation. While the vulnerability does not allow direct content modification or availability disruption, the exposure of unpublished node information undermines content privacy and editorial workflows. For organizations relying on Drupal for public-facing or internal websites, this could lead to premature disclosure of sensitive information or intellectual property. The impact is more significant for entities with strict content control requirements such as government agencies, media companies, and enterprises managing confidential data. Since exploitation requires specific permissions, the risk is mitigated somewhat by proper role assignment, but insider threats or compromised accounts with these permissions remain a concern.

Mitigation Recommendations

To mitigate CVE-2026-0748, organizations should first audit and restrict the 'Translate content' and 'Administer content translations' permissions to only trusted users who require them for their roles. Minimizing the number of users with these permissions reduces the attack surface. Administrators should monitor and review user roles regularly to prevent privilege creep. Applying updates or patches from Drupal or the module maintainers as soon as they become available is critical; if no official patch exists yet, consider disabling the i18n_node submodule temporarily if translation features are not essential. Additionally, implement strict access control policies and consider custom access control modules or hooks to enforce unpublished content restrictions more robustly. Logging and alerting on unusual access to translation interfaces or unpublished content can help detect exploitation attempts. Finally, conduct security awareness training for users with translation permissions to recognize and report suspicious activities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
drupal
Date Reserved
2026-01-08T19:50:35.556Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c5a8ce3c064ed76fd1dade

Added to database: 3/26/2026, 9:44:46 PM

Last enriched: 3/26/2026, 10:00:22 PM

Last updated: 3/26/2026, 11:00:56 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses