CVE-2026-0748
Received Received - Intake
Access Control Bypass in Drupal 7 i18n_node Exposes Unpublished Content

Publication date: 2026-03-26

Last updated on: 2026-04-01

Assigner: Drupal.org

Description
In the Drupal 7 Internationalization (i18n) module, the i18n_node submodule allows a user with both "Translate content" and "Administer content translations" permissions to view and attach unpublished nodes via the translation UI and its autocomplete widget. This bypasses intended access controls and discloses unpublished node titles and IDs. Exploit affects versions 7.x-1.0 up to and including 7.x-1.35.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-26
Last Modified
2026-04-01
Generated
2026-05-07
AI Q&A
2026-03-27
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
internationalization_project internationalization From 7.x-1.0 (inc) to 7.x-1.35 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
CWE-276 During installation, installed file permissions are set to allow anyone to modify those files.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Drupal 7 Internationalization (i18n) module, specifically in the i18n_node submodule. It allows a user who has both the "Translate content" and "Administer content translations" permissions to bypass intended access controls. Through the translation user interface and its autocomplete widget, such a user can view and attach unpublished nodes, which normally should not be accessible. This results in the disclosure of unpublished node titles and IDs.


How can this vulnerability impact me? :

The impact of this vulnerability is that unauthorized users with certain permissions can access unpublished content that should remain hidden. This can lead to unintended disclosure of sensitive or confidential information contained in unpublished node titles and IDs. Such exposure could compromise content privacy and potentially reveal internal or draft information prematurely.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows users with specific permissions to bypass access controls and view unpublished content titles and IDs. Such unauthorized disclosure of unpublished data could potentially lead to non-compliance with data protection regulations like GDPR and HIPAA, which require strict control over access to sensitive or confidential information.

However, the provided information does not explicitly state the impact on compliance with these standards.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by verifying if users with both "Translate content" and "Administer content translations" permissions are able to view or attach unpublished nodes via the translation UI or its autocomplete widget.

One way to test this is to create a user role with these permissions but without "bypass node access", then attempt to access unpublished nodes through the translation interface or autocomplete search. If unpublished node titles and IDs are returned, the system is vulnerable.

Since the autocomplete feature returns unpublished content data in JSON responses, monitoring HTTP requests to the translation autocomplete endpoint and inspecting the responses for unpublished node information can help detect exploitation attempts.

Specific commands are not provided in the resources, but you can use tools like curl or browser developer tools to send requests to the translation autocomplete endpoint and analyze the JSON responses for unpublished content exposure.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps before applying the official patch include:

  • Remove the "Administer content translations" permission from all user roles until the fix is applied.
  • Disable the autocomplete function in the translation UI by using a hook or implementing a custom callback to intercept autocomplete requests.
  • Implement custom node access checks using hook_menu_alter() to enforce proper access control.

Additionally, restrict the "Administer content translations" permission to only trusted roles to prevent unauthorized information disclosure.

The vulnerability is fixed in the patched version 7.1.36 of the i18n module, so applying this update as soon as possible is recommended.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart