{"api_version":"1","generated_at":"2026-04-23T02:37:10+00:00","cve":"CVE-2023-31250","urls":{"html":"https://cve.report/CVE-2023-31250","api":"https://cve.report/api/cve/CVE-2023-31250.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-31250","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-31250"},"summary":{"title":"CVE-2023-31250","description":"The file download facility doesn't sufficiently sanitize file paths in certain situations. This may result in users gaining access to private files that they should not have access to. Some sites may require configuration changes following this security release. Review the release notes for your Drupal version if you have issues accessing private files after updating.","state":"PUBLIC","assigner":"security@drupal.org","published_at":"2023-04-26 19:15:00","updated_at":"2023-05-05 15:27:00"},"problem_types":["CWE-863"],"metrics":[],"references":[{"url":"https://www.drupal.org/sa-core-2023-005","name":"https://www.drupal.org/sa-core-2023-005","refsource":"CONFIRM","tags":[],"title":"Drupal core - Moderately critical - Access bypass - SA-CORE-2023-005 | Drupal.org","mime":"text/html","httpstatus":"403","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-31250","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-31250","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"31250","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"drupal","cpe5":"drupal","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2023-31250","qid":"154135","title":"Drupal Core: Incorrect Authorization Vulnerability (CVE-2023-31250)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security@drupal.org","ID":"CVE-2023-31250","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Core","version":{"version_data":[{"version_affected":"<","version_name":"10.0","version_value":"10.0.8"},{"version_affected":"<","version_name":"9.5","version_value":"9.5.8"},{"version_affected":"<","version_name":"9.4","version_value":"9.4.14"},{"version_name":"7","version_value":"7.96"}]}}]},"vendor_name":"Drupal"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The file download facility doesn't sufficiently sanitize file paths in certain situations. This may result in users gaining access to private files that they should not have access to. Some sites may require configuration changes following this security release. Review the release notes for your Drupal version if you have issues accessing private files after updating."}]},"generator":{"engine":"Vulnogram 0.0.9"},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Access bypass"}]}]},"references":{"reference_data":[{"name":"https://www.drupal.org/sa-core-2023-005","refsource":"CONFIRM","url":"https://www.drupal.org/sa-core-2023-005"}]},"source":{"discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2023-04-26 19:15:00","lastModifiedDate":"2023-05-05 15:27:00","problem_types":["CWE-863"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":6.5,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*","versionStartIncluding":"10.0","versionEndExcluding":"10.0.8","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*","versionStartIncluding":"9.5","versionEndExcluding":"9.5.8","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*","versionStartIncluding":"9.4","versionEndExcluding":"9.4.14","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*","versionStartIncluding":"7.0","versionEndExcluding":"7.96","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}