https://www.drupal.org/sa-core-2026-004
https://symfony.com/blog/category/security-advisories
http://www.nessus.org/u?a60fceaa
http://www.nessus.org/u?d618ed34
https://www.drupal.org/project/drupal/releases/10.4.10
https://www.drupal.org/project/drupal/releases/10.5.10
https://www.drupal.org/project/drupal/releases/10.6.9
https://www.drupal.org/project/drupal/releases/11.1.10
https://www.drupal.org/project/drupal/releases/11.2.12
https://www.drupal.org/project/drupal/releases/11.3.10
Severity: Medium
ID: 315939
File Name: drupal_11_3_10.nasl
Version: 1.1
Type: Remote
Family: CGI abuses
Published: 5/20/2026
Updated: 5/20/2026
Configuration: Enable paranoid mode, Enable thorough checks (optional)
Supported Sensors: Nessus
Risk Factor: High
Base Score: 7.5
Temporal Score: 5.5
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS Score Source: CVE-2026-9082
Risk Factor: Medium
Base Score: 6.5
Temporal Score: 5.7
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CPE: cpe:/a:drupal:drupal
Required KB Items: installed_sw/Drupal, Settings/ParanoidReport
Exploit Ease: No known exploits are available
Patch Publication Date: 5/20/2026
Vulnerability Publication Date: 5/19/2026
CVE: CVE-2026-9082