CVE-2018-7602

Known Exploited Public Exploit
Drupal core - Highly critical - Remote Code Execution - SA-CORE-2018-004

Description

A remote code execution vulnerability exists within multiple subsystems of Drupal 7.x and 8.x. This potentially allows attackers to exploit multiple attack vectors on a Drupal site, which could result in the site being compromised. This vulnerability is related to Drupal core - Highly critical - Remote Code Execution - SA-CORE-2018-002. Both SA-CORE-2018-002 and this vulnerability are being exploited in the wild.

Remediation

Solution:

  • Solution: Upgrade to the most recent version of Drupal 7 or 8 core. If you are running 7.x, upgrade to Drupal 7.59. If you are running 8.5.x, upgrade to Drupal 8.5.3. If you are running 8.4.x, upgrade to Drupal 8.4.8. (Drupal 8.4.x is no longer supported and we don't normally provide security releases for unsupported minor releases. However, we are providing this 8.4.x release so that sites can update as quickly as possible. You should update to 8.4.8 immediately, then update to 8.5.3 or the latest secure release as soon as possible.) If you are unable to update immediately, or if you are running a Drupal distribution that does not yet include this security release, you can attempt to apply the patch below to fix the vulnerability until you are able to update completely: Patch for Drupal 8.x (8.5.x and below) Patch for Drupal 7.x These patches will only work if your site already has the fix from SA-CORE-2018-002 applied. (If your site does not have that fix, it may already be compromised.)

Category

9.8
CVSS
Severity: Critical
CVSS 3.1 •
CVSS 2.0 •
EPSS 94.42% Top 5%
KEV Since 
Vendor Advisory debian.org Vendor Advisory drupal.org
Affected: Drupal core
Published at:
Updated at:

References

Link Tags
https://www.exploit-db.com/exploits/44557/ exploit vdb entry third party advisory
http://www.securitytracker.com/id/1040754 vdb entry third party advisory broken link
https://lists.debian.org/debian-lts-announce/2018/04/msg00030.html third party advisory mailing list
https://www.exploit-db.com/exploits/44542/ exploit vdb entry third party advisory
https://www.debian.org/security/2018/dsa-4180 third party advisory vendor advisory
https://www.drupal.org/sa-core-2018-004 patch vendor advisory
http://www.securityfocus.com/bid/103985 vdb entry third party advisory broken link

Frequently Asked Questions

What is the severity of CVE-2018-7602?
CVE-2018-7602 has been scored as a critical severity vulnerability.
How to fix CVE-2018-7602?
To fix CVE-2018-7602: Solution: Upgrade to the most recent version of Drupal 7 or 8 core. If you are running 7.x, upgrade to Drupal 7.59. If you are running 8.5.x, upgrade to Drupal 8.5.3. If you are running 8.4.x, upgrade to Drupal 8.4.8. (Drupal 8.4.x is no longer supported and we don't normally provide security releases for unsupported minor releases. However, we are providing this 8.4.x release so that sites can update as quickly as possible. You should update to 8.4.8 immediately, then update to 8.5.3 or the latest secure release as soon as possible.) If you are unable to update immediately, or if you are running a Drupal distribution that does not yet include this security release, you can attempt to apply the patch below to fix the vulnerability until you are able to update completely: Patch for Drupal 8.x (8.5.x and below) Patch for Drupal 7.x These patches will only work if your site already has the fix from SA-CORE-2018-002 applied. (If your site does not have that fix, it may already be compromised.)
Is CVE-2018-7602 being actively exploited in the wild?
It is confirmed that CVE-2018-7602 is actively exploited. Be extra cautious if you are using vulnerable components. According to its EPSS score, there is a ~94% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2018-7602?
CVE-2018-7602 affects Drupal core.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.