CVE-2024-13272
📋 TL;DR
This vulnerability in Drupal Paragraphs table module allows attackers to spoof content by manipulating table data due to insufficient access controls. It affects Drupal sites using the Paragraphs table module. Users with content editing permissions could be exploited to display misleading information.
💻 Affected Systems
- Drupal Paragraphs table module
📦 What is this software?
Paragraphs Table by Paragraphs Table Project
Paragraphs Table by Paragraphs Table Project
⚠️ Risk & Real-World Impact
Worst Case
Attackers could inject malicious content that appears legitimate, potentially leading to phishing, misinformation, or defacement of trusted content.
Likely Case
Content editors could inadvertently or maliciously modify table content to display misleading information to site visitors.
If Mitigated
With proper access controls and content review processes, impact is limited to minor content display issues.
🎯 Exploit Status
Exploitation requires content editing permissions. No public exploit code identified at time of analysis.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.23.0 for 1.x branch, 2.0.2 for 2.x branch
Vendor Advisory: https://www.drupal.org/sa-contrib-2024-036
Restart Required: No
Instructions:
1. Update Paragraphs table module to version 1.23.0 (for 1.x) or 2.0.2 (for 2.x). 2. Clear Drupal caches. 3. Verify module functionality post-update.
🔧 Temporary Workarounds
Restrict content editing permissions
allTemporarily limit content editing capabilities to trusted administrators only
drush role:perm:remove 'content_editor' 'edit any paragraph_table content'
Disable Paragraphs table module
allTemporarily disable the vulnerable module if not essential
drush pm:uninstall paragraphs_table
🧯 If You Can't Patch
- Implement strict content review workflows for all table content changes
- Enable Drupal's content moderation features to require approval for content changes
🔍 How to Verify
Check if Vulnerable:
Check installed Paragraphs table module version via Drupal admin interface or using drush: drush pm:list | grep paragraphs_table
Check Version:
drush pm:list --fields=name,version | grep paragraphs_table
Verify Fix Applied:
Verify module version is 1.23.0 or higher (1.x) or 2.0.2 or higher (2.x) and test table content editing functionality
📡 Detection & Monitoring
Log Indicators:
- Unusual frequency of paragraph_table content modifications
- Content edits from unexpected user accounts
Network Indicators:
- N/A - this is an application layer vulnerability
SIEM Query:
source="drupal_watchdog" AND (message="paragraph_table" OR message="table content modified")