CVE-2026-0945

5.4 MEDIUM

📋 TL;DR

A privilege escalation vulnerability in Drupal's Role Delegation module allows authenticated users with role assignment permissions to assign themselves or others privileged roles they shouldn't have access to. This affects Drupal sites using Role Delegation module versions 1.3.0 through 1.4.x.

💻 Affected Systems

Products:
  • Drupal Role Delegation module
Versions: from 1.3.0 before 1.5.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Drupal sites with the Role Delegation module installed and enabled. Requires authenticated users with role assignment permissions.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated user with role assignment permissions could grant themselves administrative privileges, gaining full control over the Drupal site including content, users, and configuration.

🟠

Likely Case

Users with limited role management permissions could escalate their privileges to access restricted functionality or data they shouldn't have access to.

🟢

If Mitigated

With proper access controls and monitoring, unauthorized privilege changes would be detected and reverted before significant damage occurs.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with role assignment permissions. The vulnerability is in the permission checking logic.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.5.0

Vendor Advisory: https://www.drupal.org/sa-contrib-2026-002

Restart Required: No

Instructions:

1. Update Role Delegation module to version 1.5.0 or later via Drupal's update manager or Composer. 2. Clear Drupal cache after update. 3. Verify module version in Extend page.

🔧 Temporary Workarounds

Disable Role Delegation module

all

Temporarily disable the vulnerable module until patching is possible

drush pm-disable role_delegation

Restrict role assignment permissions

all

Temporarily remove role assignment permissions from all users except trusted administrators

🧯 If You Can't Patch

  • Implement strict monitoring of user role changes and audit logs
  • Restrict access to user management interfaces using web application firewall rules

🔍 How to Verify

Check if Vulnerable:

Check Role Delegation module version in Drupal's Extend page or via 'drush pm-list | grep role_delegation'

Check Version:

drush pm-list --fields=name,version | grep role_delegation

Verify Fix Applied:

Confirm Role Delegation module version is 1.5.0 or higher in Drupal Extend page

📡 Detection & Monitoring

Log Indicators:

  • Unexpected role assignment events in Drupal watchdog logs
  • Multiple role changes for single user in short timeframe

Network Indicators:

  • POST requests to user role assignment endpoints from non-admin users

SIEM Query:

source="drupal" AND (event="user_role_assignment" OR message="role assignment") AND NOT user="admin"

🔗 References

📤 Share & Export