Drupal core - Moderately critical - Gadget chain - SA-CORE-2024-007
Description
Deserialization of Untrusted Data vulnerability in Drupal Core allows Object Injection.This issue affects Drupal Core: from 8.0.0 before 10.2.11, from 10.3.0 before 10.3.9, from 11.0.0 before 11.0.8.
Drupal core contains a chain of methods that is exploitable when an insecure deserialization vulnerability exists on the site. This so-called gadget chain presents no direct threat but is a vector that can be used to achieve remote code execution if the application deserializes untrusted data due to another vulnerability.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Drupal core contains a PHP object injection gadget chain that, combined with another vulnerability, could lead to remote code execution; patched in versions 10.2.11, 10.3.9, and 11.0.8.
CVE-2024-55637 describes a deserialization gadget chain in Drupal core that, while not directly exploitable, can be used to achieve remote code execution if an attacker can trigger deserialization of untrusted data via a separate vulnerability [2]. The root cause is that certain classes in Drupal core contain properties that, when deserialized, can invoke a chain of methods leading to arbitrary code execution. The Drupal security advisory (SA-CORE-2024-007) notes that this is a potential PHP Object Injection vulnerability that requires another exploit to pass unsafe input to unserialize() [3].
The attack surface requires the presence of a separate vulnerability that allows an attacker to supply untrusted data to a deserialization call. No authentication is needed if such a vulnerability exists. The gadget chain itself is a vector that amplifies the impact of an insecure deserialization flaw. The fix, visible in the commit [4], adds type hints to properties such as $query in the ViewExecutable class, which prevents the gadget chain from being triggered during deserialization.
If successfully exploited, an attacker could achieve remote code execution on the affected Drupal site. However, the Drupal Security Team states that there are no known exploits in Drupal core that directly allow untrusted deserialization, and the issue is rated as moderately critical [3].
The vulnerability affects Drupal core versions from 8.0.0 before 10.2.11, from 10.3.0 before 10.3.9, and from 11.0.0 before 11.0.8. Drupal 7 is not affected. Users are advised to update to the latest patched versions: 10.2.11, 10.3.9, or 11.0.8. Older versions (Drupal 8, 9, and 10 prior to 10.2) are end-of-life and no longer receive security coverage [3].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
drupal/corePackagist | >= 8.8.0, < 10.2.11 | 10.2.11 |
drupal/corePackagist | >= 10.3.0, < 10.3.9 | 10.3.9 |
drupal/corePackagist | >= 11.0.0, < 11.0.8 | 11.0.8 |
drupal/core-recommendedPackagist | >= 8.8.0, < 10.2.11 | 10.2.11 |
drupal/core-recommendedPackagist | >= 10.3.0, < 10.3.9 | 10.3.9 |
drupal/core-recommendedPackagist | >= 11.0.0, < 11.0.8 | 11.0.8 |
drupal/drupalPackagist | >= 8.8.0, < 10.2.11 | 10.2.11 |
drupal/drupalPackagist | >= 10.3.0, < 10.3.9 | 10.3.9 |
drupal/drupalPackagist | >= 11.0.0, < 11.0.8 | 11.0.8 |
Affected products
6- Range: >=8.0.0, <10.2.11; >=10.3.0, <10.3.9; >=11.0.0, <11.0.8
- osv-coords4 versionspkg:bitnami/drupalpkg:composer/drupal/corepkg:composer/drupal/core-recommendedpkg:composer/drupal/drupal
>= 8.0.0, < 10.3.9+ 3 more
- (no CPE)range: >= 8.0.0, < 10.3.9
- (no CPE)range: >= 8.8.0, < 10.2.11
- (no CPE)range: >= 8.8.0, < 10.2.11
- (no CPE)range: >= 8.8.0, < 10.2.11
- Drupal/Drupal Corev5Range: 8.0.0
Patches
11664030d399cSA-CORE-2024-007 by mcdruid, larowlan
1 file changed · +2 −1
modules/views/src/ViewExecutable.php+2 −1 modified@@ -8,6 +8,7 @@ use Drupal\Core\Routing\RouteProviderInterface; use Drupal\Core\Session\AccountInterface; use Drupal\views\Plugin\views\display\DisplayRouterInterface; +use Drupal\views\Plugin\views\query\QueryPluginBase; use Drupal\views\Plugin\ViewsPluginManager; use Symfony\Component\HttpFoundation\Request; use Symfony\Component\HttpFoundation\Response; @@ -219,7 +220,7 @@ class ViewExecutable { * * @var \Drupal\views\Plugin\views\query\QueryPluginBase */ - public $query = NULL; + public ?QueryPluginBase $query = NULL; /** * The used pager plugin used by the current executed view.
Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
4News mentions
1- Drupal core - Moderately critical - Gadget chain - SA-CORE-2024-007Drupal Security Advisories · Nov 20, 2024