Drupal Warns of 'Highly Critical' Vulnerability Ahead of Emergency Patch
Drupal is preparing an emergency patch for a 'highly critical' vulnerability, warning that exploit code could appear within hours or days of disclosure.

Drupal has issued an urgent warning to administrators of the open-source content management system, announcing that a patch for a 'highly critical' vulnerability will be released on May 20. The developers cautioned that exploit code could be developed within hours or days of the disclosure, marking the first such severity warning for the platform in years.
The security update will be delivered between 17:00 and 21:00 UTC on May 20, covering all supported versions of Drupal, including 11.3.x, 11.2.x, 10.6.x, and 10.5.x. In a notice posted this week, the Drupal Security Team urged site administrators to reserve time during the release window to assess whether their sites are affected and apply the update immediately. "Mitigation information will be included in the advisory," the developers stated.
While no CVE identifier has been assigned yet, the Drupal Security Team emphasized that no further details about the vulnerability can be shared before the patch is released. The warning is notable because Drupal has not classified a flaw as 'highly critical' in several years, and the last known exploitation of a Drupal vulnerability in the wild occurred in 2019. Prior to that, the platform was hit by the infamous Drupalgeddon and Drupalgeddon2 vulnerabilities, which were used to compromise thousands of websites.
So far in 2026, Drupal has patched 40 security issues, but few have been rated critical. The current advisory signals a significant escalation in severity, prompting comparisons to the Drupalgeddon era. The developers' warning that exploits "might" be created rapidly suggests the vulnerability may be relatively easy to weaponize, increasing the urgency for administrators to act quickly.
Drupal powers hundreds of thousands of websites globally, including many government, enterprise, and high-traffic content sites. A successful exploit could allow attackers to gain unauthorized access, execute arbitrary code, or compromise sensitive data. The lack of pre-disclosure details means administrators must prepare for a broad range of potential impacts.
The Drupal Security Team has not indicated whether the vulnerability is being actively exploited in the wild, but the preemptive warning suggests a high level of concern. Site administrators are advised to monitor the official Drupal security advisory page on May 20 and apply the patch as soon as it becomes available. Organizations with limited patching capacity should prioritize Drupal systems given the risk of rapid exploitation.
This incident underscores the ongoing challenge of securing widely deployed open-source platforms against critical vulnerabilities. As threat actors increasingly target content management systems, timely patching remains the most effective defense. The Drupal community will be watching closely to see whether this vulnerability triggers a wave of attacks reminiscent of the Drupalgeddon incidents.
The Register's report adds that the vulnerability affects not only supported Drupal core branches (11.3.x, 11.2.x, 10.6.x, 10.5.x) but also unsupported 11.1.x, 10.4.x, 8.9, and 9.5, with manual patches for the older branches that may introduce regressions. The article further clarifies that Drupal CMS (the preconfigured version) is not affected, and that Drupal Steward WAF customers are partially protected but still urged to patch. The severity score of 20/25 is explained in detail: the bug requires no privileges, is trivial to exploit, and can expose non-public data or allow modification/deletion, falling short of a perfect score only because no known exploit exists yet and it only affects configurations using uncommon modules.
The Drupal Security Team has now specified that the emergency patch will be released on May 20 between 17:00 and 21:00 UTC, and that fixes will cover Drupal 11.3.x through 10.4.x, with unsupported versions 11.1.x and 10.4.x receiving patches as well. Administrators running end-of-life Drupal 8 or 9 will not get official patches but can apply hotfix files for versions 9.5.11 and 8.9.20. Sites protected by Drupal Steward are already shielded against known attack vectors, though an update is still strongly recommended.