INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global ransomware Financial Services / Cybersecurity CRITICAL 53m Global vulnerability Information Technology / Cybersecurity CRITICAL 2h Global malware Energy and Utilities CRITICAL 3h Global ransomware Multiple sectors CRITICAL 3h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 6h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 6h Global phishing Multiple sectors HIGH 7h Global insider Cybersecurity Services CRITICAL 7h Global ransomware Multiple sectors (U.S. companies) CRITICAL 7h Global malware Financial Services, Cryptocurrency CRITICAL 8h Global ransomware Financial Services / Cybersecurity CRITICAL 53m Global vulnerability Information Technology / Cybersecurity CRITICAL 2h Global malware Energy and Utilities CRITICAL 3h Global ransomware Multiple sectors CRITICAL 3h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 6h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 6h Global phishing Multiple sectors HIGH 7h Global insider Cybersecurity Services CRITICAL 7h Global ransomware Multiple sectors (U.S. companies) CRITICAL 7h Global malware Financial Services, Cryptocurrency CRITICAL 8h Global ransomware Financial Services / Cybersecurity CRITICAL 53m Global vulnerability Information Technology / Cybersecurity CRITICAL 2h Global malware Energy and Utilities CRITICAL 3h Global ransomware Multiple sectors CRITICAL 3h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 6h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 6h Global phishing Multiple sectors HIGH 7h Global insider Cybersecurity Services CRITICAL 7h Global ransomware Multiple sectors (U.S. companies) CRITICAL 7h Global malware Financial Services, Cryptocurrency CRITICAL 8h
Vulnerabilities

CVE-2018-7600

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
Drupal Core Remote Code Execution Vulnerability — Drupal Core contains a remote code execution vulnerability that could allow an attacker to exploit multiple attack vectors on a Drupal site, resulting
Published: Nov 3, 2021  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Drupal Core Remote Code Execution Vulnerability — Drupal Core contains a remote code execution vulnerability that could allow an attacker to exploit multiple attack vectors on a Drupal site, resulting in complete site compromise.

🤖 AI Executive Summary

CVE-2018-7600, known as 'Drupalgeddon 2,' is a critical remote code execution vulnerability in Drupal Core that allows unauthenticated attackers to execute arbitrary code on vulnerable Drupal websites, leading to complete site compromise. With a CVSS score of 9.0 and publicly available exploits actively used in the wild, this vulnerability has been extensively weaponized since its disclosure in March 2018. It affects Drupal versions before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1. Organizations running unpatched Drupal installations face immediate risk of data theft, defacement, ransomware deployment, and use as pivot points for further network intrusion.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 11, 2026 11:54
🇸🇦 Saudi Arabia Impact Assessment
This vulnerability poses significant risk to Saudi organizations across multiple sectors. Government entities (regulated by NCA) frequently use Drupal for public-facing portals and e-services platforms, making them prime targets. Saudi universities, healthcare institutions, and semi-government organizations also commonly deploy Drupal CMS. Banking sector websites (SAMA-regulated) and energy sector portals (including ARAMCO subsidiaries and contractors) that use Drupal are at critical risk. Telecom operators like STC, Mobily, and Zain may have customer-facing or internal portals built on Drupal. Given that Saudi Arabia is a high-value target for nation-state actors and hacktivists, unpatched Drupal instances represent an easily exploitable entry point. The Saudi Vision 2030 digital transformation initiatives have increased the number of web-based government services, amplifying the attack surface.
🏢 Affected Saudi Sectors
Government Banking Healthcare Education Energy Telecommunications Retail Transportation
⚖️ Saudi Risk Score (AI)
9.5
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS:
1. Identify all Drupal installations across the organization using asset discovery tools and web application inventories
2. Immediately patch Drupal to the following minimum versions: Drupal 7.58+, Drupal 8.3.9+, Drupal 8.4.6+, or Drupal 8.5.1+
3. If immediate patching is not possible, take vulnerable Drupal sites offline or place them behind a WAF with specific Drupalgeddon 2 rules

PATCHING GUIDANCE:
4. Apply the official security patches from https://www.drupal.org/sa-core-2018-002
5. After patching, update to the latest available Drupal version for comprehensive security coverage
6. Review and update all contributed modules and themes

COMPENSATING CONTROLS:
7. Deploy WAF rules to block exploitation attempts targeting Form API (FAPI) AJAX requests with malicious render arrays
8. Block requests containing '#' characters in form element names at the WAF/reverse proxy level
9. Implement network segmentation to isolate web servers from internal networks
10. Restrict outbound connections from web servers to prevent reverse shell callbacks

DETECTION RULES:
11. Monitor web server logs for POST requests to paths containing 'user/register' or 'user/password' with unusual parameters
12. Search for indicators of compromise: unexpected PHP files in Drupal directories, modified .htaccess files, new admin accounts
13. Deploy IDS/IPS signatures for Drupalgeddon 2 (Snort SID: 46316, 46317, 46318)
14. Monitor for outbound connections from web servers to known C2 infrastructure
15. Conduct forensic analysis on any Drupal servers that were exposed while unpatched to check for existing compromise
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. تحديد جميع تثبيتات Drupal عبر المؤسسة باستخدام أدوات اكتشاف الأصول وجرد تطبيقات الويب
2. تحديث Drupal فوراً إلى الإصدارات التالية كحد أدنى: Drupal 7.58+ أو Drupal 8.3.9+ أو Drupal 8.4.6+ أو Drupal 8.5.1+
3. إذا لم يكن التحديث الفوري ممكناً، قم بإيقاف مواقع Drupal المعرضة للخطر أو ضعها خلف جدار حماية تطبيقات الويب مع قواعد محددة لـ Drupalgeddon 2

إرشادات التحديث:
4. تطبيق التصحيحات الأمنية الرسمية من https://www.drupal.org/sa-core-2018-002
5. بعد التحديث، قم بالترقية إلى أحدث إصدار متاح من Drupal للحصول على تغطية أمنية شاملة
6. مراجعة وتحديث جميع الوحدات والقوالب المساهمة

الضوابط التعويضية:
7. نشر قواعد جدار حماية تطبيقات الويب لحظر محاولات الاستغلال التي تستهدف طلبات AJAX لواجهة برمجة النماذج مع مصفوفات عرض ضارة
8. حظر الطلبات التي تحتوي على أحرف '#' في أسماء عناصر النماذج على مستوى جدار الحماية/الوكيل العكسي
9. تنفيذ تجزئة الشبكة لعزل خوادم الويب عن الشبكات الداخلية
10. تقييد الاتصالات الصادرة من خوادم الويب لمنع عمليات الاتصال العكسي

قواعد الكشف:
11. مراقبة سجلات خادم الويب لطلبات POST إلى المسارات التي تحتوي على 'user/register' أو 'user/password' مع معلمات غير عادية
12. البحث عن مؤشرات الاختراق: ملفات PHP غير متوقعة في أدلة Drupal، ملفات .htaccess معدلة، حسابات مسؤول جديدة
13. نشر توقيعات IDS/IPS لـ Drupalgeddon 2 (Snort SID: 46316, 46317, 46318)
14. مراقبة الاتصالات الصادرة من خوادم الويب إلى بنية تحتية C2 معروفة
15. إجراء تحليل جنائي على أي خوادم Drupal كانت مكشوفة أثناء عدم التحديث للتحقق من وجود اختراق قائم
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC 2-3-1: Vulnerability Management ECC 2-3-4: Patch Management ECC 2-5-1: Web Application Security ECC 2-2-1: Asset Management ECC 2-6-1: Incident Management ECC 2-3-3: Penetration Testing
🔵 SAMA CSF
SAMA CSF 3.3.3: Patch Management SAMA CSF 3.3.4: Vulnerability Management SAMA CSF 3.3.7: Web Application Security SAMA CSF 3.4.1: Incident Detection SAMA CSF 3.3.1: Network Security
🟡 ISO 27001:2022
A.8.8: Management of Technical Vulnerabilities A.8.9: Configuration Management A.8.23: Web Filtering A.8.16: Monitoring Activities A.5.24: Information Security Incident Management Planning
🟣 PCI DSS v4.0
PCI DSS 6.3.3: Patching Critical Vulnerabilities PCI DSS 6.4: Web Application Firewall PCI DSS 11.3: Penetration Testing PCI DSS 6.2: System Components Security Patches PCI DSS 10.6: Log Monitoring
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
Drupal:Drupal Core
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS94.49%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2022-05-03
Published 2021-11-03
Source Feed cisa_kev
Views 4
🇸🇦 Saudi Risk Score
9.5
/ 10.0 — Saudi Risk
🏷️ Tags
kev actively-exploited ransomware
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.