CVE-2026-0948

6.5 MEDIUM

📋 TL;DR

This CVE describes an authentication bypass vulnerability in Drupal's Microsoft Entra ID SSO Login module that allows attackers to access privileged functionality without proper credentials. The vulnerability affects all Drupal sites using this module from version 0.0.0 up to (but not including) 1.0.4. Attackers can exploit this to gain unauthorized access and potentially escalate privileges on affected Drupal installations.

💻 Affected Systems

Products:
  • Drupal Microsoft Entra ID SSO Login module
Versions: 0.0.0 to 1.0.3
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Drupal sites with the Microsoft Entra ID SSO Login module installed and enabled.

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative access to the Drupal site, allowing them to modify content, install malicious modules, access sensitive data, or take full control of the system.

🟠

Likely Case

Unauthorized users bypass authentication to access privileged areas of the site, potentially viewing sensitive information or performing actions reserved for authenticated users.

🟢

If Mitigated

With proper network segmentation and monitoring, unauthorized access attempts are detected and blocked before significant damage occurs.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Authentication bypass vulnerabilities typically require minimal technical skill to exploit once the attack vector is understood.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.0.4

Vendor Advisory: https://www.drupal.org/sa-contrib-2026-005

Restart Required: No

Instructions:

1. Update the Microsoft Entra ID SSO Login module to version 1.0.4 or later via Drupal's update manager. 2. Clear Drupal caches. 3. Verify the update was successful by checking the module version.

🔧 Temporary Workarounds

Disable the vulnerable module

all

Temporarily disable the Microsoft Entra ID SSO Login module until patching is possible

drush pm-disable microsoft_entra_id_sso_login

Implement additional authentication controls

all

Add IP-based restrictions or additional authentication layers to the affected paths

🧯 If You Can't Patch

  • Implement network-level access controls to restrict access to the Drupal admin interface
  • Enable detailed logging and monitoring for authentication attempts and privilege escalation events

🔍 How to Verify

Check if Vulnerable:

Check the installed version of the Microsoft Entra ID SSO Login module in Drupal's Extend page or via drush: drush pm-list | grep microsoft_entra_id_sso_login

Check Version:

drush pm-list --fields=name,version | grep microsoft_entra_id_sso_login

Verify Fix Applied:

Verify the module version is 1.0.4 or higher and test authentication flows to ensure proper access controls are enforced

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication patterns
  • Access to admin pages from unexpected IPs or users
  • Failed authentication attempts followed by successful privileged access

Network Indicators:

  • HTTP requests bypassing authentication endpoints
  • Unusual traffic patterns to admin URLs

SIEM Query:

source="drupal_access_log" AND (uri_path="/admin*" OR uri_path="/user*" OR status_code=403) AND NOT user_agent="crawler" | stats count by src_ip, uri_path

🔗 References

📤 Share & Export