Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0945: CWE-267 Privilege Defined With Unsafe Actions in Drupal Role Delegation

0
Unknown
VulnerabilityCVE-2026-0945cvecve-2026-0945cwe-267
Published: Wed Feb 04 2026 (02/04/2026, 20:25:28 UTC)
Source: CVE Database V5
Vendor/Project: Drupal
Product: Role Delegation

Description

Privilege Defined With Unsafe Actions vulnerability in Drupal Role Delegation allows Privilege Escalation.This issue affects Role Delegation: from 1.3.0 before 1.5.0.

AI-Powered Analysis

AILast updated: 02/04/2026, 21:01:46 UTC

Technical Analysis

CVE-2026-0945 identifies a privilege escalation vulnerability in the Drupal Role Delegation module, specifically affecting versions from 1.3.0 before 1.5.0. The vulnerability stems from a CWE-267 weakness, where privileges are defined with unsafe actions, leading to improper access control enforcement. Role Delegation is a module that allows site administrators to delegate role management capabilities to other users. Due to unsafe privilege definitions, an attacker with limited access can exploit this flaw to escalate their privileges beyond intended limits, potentially gaining administrative rights. This can compromise the confidentiality, integrity, and availability of the Drupal site. The vulnerability does not require known exploits in the wild yet, but its presence in a widely used CMS module makes it a significant risk. No CVSS score has been assigned, but the nature of the vulnerability suggests a high risk due to the potential for privilege escalation without complex exploitation steps. The issue was published on February 4, 2026, and no patch links are currently provided, indicating that users should monitor for updates and apply them promptly. The vulnerability affects only the Role Delegation module, not Drupal core, but given the module's role in permission management, the impact can be severe if exploited.

Potential Impact

For European organizations, this vulnerability poses a significant risk to web applications running Drupal with the Role Delegation module in the affected versions. Successful exploitation can lead to unauthorized privilege escalation, allowing attackers to modify site content, access sensitive data, or disrupt services. This can result in data breaches, defacement, or loss of service continuity, impacting business operations and reputation. Organizations in sectors such as government, finance, healthcare, and critical infrastructure, which often rely on Drupal for public-facing websites and portals, are particularly vulnerable. The lack of known exploits currently reduces immediate risk, but the potential for rapid exploitation once public details are widely known is high. Additionally, compliance with GDPR and other data protection regulations may be jeopardized if personal data is exposed due to this vulnerability.

Mitigation Recommendations

1. Immediately audit all Drupal installations to identify the use of the Role Delegation module and verify the version in use. 2. Upgrade the Role Delegation module to version 1.5.0 or later as soon as it becomes available, since this version is expected to address the vulnerability. 3. Until a patch is applied, restrict access to role delegation features to only the most trusted administrators and review all delegated roles for unnecessary privileges. 4. Implement strict monitoring and logging of role changes and administrative actions to detect suspicious activities early. 5. Conduct regular security assessments and penetration tests focusing on privilege escalation vectors within Drupal environments. 6. Educate site administrators about the risks of privilege delegation and enforce the principle of least privilege. 7. Follow Drupal security advisories closely for updates or patches related to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
drupal
Date Reserved
2026-01-14T16:52:29.540Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6983afd6f9fa50a62fabdb28

Added to database: 2/4/2026, 8:45:10 PM

Last enriched: 2/4/2026, 9:01:46 PM

Last updated: 2/7/2026, 11:00:59 AM

Views: 21

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats