View online: https://www.drupal.org/sa-contrib-2026-016
Project: Islandora [1] Date: 2026-February-25 Security risk: *Moderately critical* 14 ∕ 25 AC:Basic/A:User/CI:Some/II:Some/E:Theoretical/TD:All [2] Vulnerability: Arbitrary file upload, Cross-site scripting
Affected versions: <2.17.5 CVE IDs: CVE-2026-3215 Description: This module integrates with Islandora, an open-source digital asset management (DAM) framework. Islandora integrates with various open-source services, which can be run in a distributed environment.
The module doesn't sufficiently sanitize URI paths for its custom route used for attaching media to nodes, which can also lead to cross-site scripting and other vulnerabilities.
This vulnerability is mitigated by the fact that an attacker must have a role with the permission "create media" and the ability to edit the node the media is being attached to.
Solution: Install the latest version:
* If you use the Islandora module, upgrade to Islandora 2.17.5 [3].
Reported By: * Drew Webber (mcdruid) [4] of the Drupal Security Team
Fixed By: * Joe Corall (joecorall) [5] * Rosie Le Faive (rosiel) [6]
Coordinated By: * Damien McKenna (damienmckenna) [7] of the Drupal Security Team * Greg Knaddison (greggles) [8] of the Drupal Security Team * Drew Webber (mcdruid) [9] of the Drupal Security Team * Juraj Nemec (poker10) [10] of the Drupal Security Team * Jess (xjm) [11] of the Drupal Security Team
------------------------------------------------------------------------------ Contribution record [12]
[1] https://www.drupal.org/project/islandora [2] https://www.drupal.org/security-team/risk-levels [3] https://www.drupal.org/project/islandora/releases/2.17.5 [4] https://www.drupal.org/u/mcdruid [5] https://www.drupal.org/u/joecorall [6] https://www.drupal.org/u/rosiel [7] https://www.drupal.org/u/damienmckenna [8] https://www.drupal.org/u/greggles [9] https://www.drupal.org/u/mcdruid [10] https://www.drupal.org/u/poker10 [11] https://www.drupal.org/u/xjm [12] https://new.drupal.org/contribution-record?source_link=https%3A//www.drupal....