CVE-2024-13272

6.3 MEDIUM

📋 TL;DR

This vulnerability in Drupal Paragraphs table module allows attackers to spoof content by manipulating table data due to insufficient access controls. It affects Drupal sites using the Paragraphs table module. Users with content editing permissions could be exploited to display misleading information.

💻 Affected Systems

Products:
  • Drupal Paragraphs table module
Versions: from 0.0.0 before 1.23.0, from 2.0.0 before 2.0.2
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Drupal installation with Paragraphs table module enabled and content editing capabilities.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could inject malicious content that appears legitimate, potentially leading to phishing, misinformation, or defacement of trusted content.

🟠

Likely Case

Content editors could inadvertently or maliciously modify table content to display misleading information to site visitors.

🟢

If Mitigated

With proper access controls and content review processes, impact is limited to minor content display issues.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires content editing permissions. No public exploit code identified at time of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.23.0 for 1.x branch, 2.0.2 for 2.x branch

Vendor Advisory: https://www.drupal.org/sa-contrib-2024-036

Restart Required: No

Instructions:

1. Update Paragraphs table module to version 1.23.0 (for 1.x) or 2.0.2 (for 2.x). 2. Clear Drupal caches. 3. Verify module functionality post-update.

🔧 Temporary Workarounds

Restrict content editing permissions

all

Temporarily limit content editing capabilities to trusted administrators only

drush role:perm:remove 'content_editor' 'edit any paragraph_table content'

Disable Paragraphs table module

all

Temporarily disable the vulnerable module if not essential

drush pm:uninstall paragraphs_table

🧯 If You Can't Patch

  • Implement strict content review workflows for all table content changes
  • Enable Drupal's content moderation features to require approval for content changes

🔍 How to Verify

Check if Vulnerable:

Check installed Paragraphs table module version via Drupal admin interface or using drush: drush pm:list | grep paragraphs_table

Check Version:

drush pm:list --fields=name,version | grep paragraphs_table

Verify Fix Applied:

Verify module version is 1.23.0 or higher (1.x) or 2.0.2 or higher (2.x) and test table content editing functionality

📡 Detection & Monitoring

Log Indicators:

  • Unusual frequency of paragraph_table content modifications
  • Content edits from unexpected user accounts

Network Indicators:

  • N/A - this is an application layer vulnerability

SIEM Query:

source="drupal_watchdog" AND (message="paragraph_table" OR message="table content modified")

🔗 References

📤 Share & Export