{"vulnerability": "CVE-2026-9082", "sightings": [{"uuid": "819274b7-cb32-46d4-bd2f-f3f98e25d57a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-9082", "type": "seen", "source": "https://t.me/GithubRedTeam/85150", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #CVE-2026 #POC\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a cve-2026-9082\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a lysophavin18\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a Unknown\n\u2b50 Star\u6570\u91cf\uff1a 0  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 0\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-05-21 04:31:25\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\ncve poc\n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "creation_timestamp": "2026-05-21T05:00:06.000000Z"}, {"uuid": "9c264205-2687-44d3-b0f8-4b01d6467948", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-9082", "type": "seen", "source": "https://infosec.exchange/users/decio/statuses/116611187676539432", "content": "Si votre CMS est un #Drupal, ou si vous connaissez quelqu\u2019un qui administre un site Drupal : c\u2019est le moment de v\u00e9rifier la version. \nLa faille CVE-2026-9082 touche Drupal Core avec base PostgreSQL : injection SQL critique, exploitable sans compte, pouvant mener \u00e0 fuite de donn\u00e9es, \u00e9l\u00e9vation de privil\u00e8ges voire RCE selon le contexte.\n\u00c0 corriger en priorit\u00e9 :Drupal 10.5 \u2192 10.5.10Drupal 10.6 \u2192 10.6.9Drupal 11.2 \u2192 11.2.12Drupal 11.3 \u2192 11.3.10\nMySQL/MariaDB ne semblent pas concern\u00e9s par cette SQLi, mais les mises \u00e0 jour incluent aussi Symfony/Twig : patch recommand\u00e9 pour tout le monde.\ud83d\udc47 https://www.drupal.org/sa-core-2026-004\n\"Drupal \u2013 CVE-2026-9082 : cette faille critique de type injection SQL menace les sites Web\"\ud83d\udc47 https://www.it-connect.fr/drupal-cve-2026-9082-cette-faille-critique-de-type-injection-sql-menace-les-sites-web/\n\ud83d\udd0d (\u00e0 noter la diff entre estimation LLM VLAI et attribution CVSS officielle en Medium)\ud83d\udc47 https://vulnerability.circl.lu/vuln/CVE-2026-9082\n\ud83d\udcac \u2b07\ufe0f https://infosec.pub/\n#CyberVeille #CVE_2026_9082", "creation_timestamp": "2026-05-21T06:38:40.457623Z"}, {"uuid": "79abc78b-9314-45ad-8bf6-ffd426630f5e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-9082", "type": "seen", "source": "https://bsky.app/profile/postac001.bsky.social/post/3mmdtasgidf2a", "content": "Drupal Core\u306bDB\u62bd\u8c61\u5316API\u306e\u8106\u5f31\u6027(CVE-2026-9082)\u304c\u3042\u308a\u3001PostgreSQL\u74b0\u5883\u3067\u30ea\u30e2\u30fc\u30c8\u30b3\u30fc\u30c9\u5b9f\u884c\u7b49\u306e\u653b\u6483\u304c\u53ef\u80fd\u3002", "creation_timestamp": "2026-05-21T06:48:43.052596Z"}, {"uuid": "a85a2eb9-f7c8-4eee-908a-885f16520ce3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-9082", "type": "seen", "source": "https://bsky.app/profile/hendryadrian.bsky.social/post/3mmdtvqkkx62z", "content": "Drupal Core patched CVE-2026-9082, a critical PostgreSQL-only flaw that could enable SQL injection, privilege escalation, info disclosure, and even remote code execution on affected sites. #Drupal #PostgreSQL #CVE20269082", "creation_timestamp": "2026-05-21T07:00:25.926169Z"}, {"uuid": "f94d6f44-eb61-44d4-844f-b652af4cfe95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-9082", "type": "seen", "source": "https://thehackernews.com/2026/05/highly-critical-drupal-core-flaw.html", "content": "Drupal has released security updates for a \"highly critical\" security vulnerability in Drupal Core that could be exploited by attackers to achieve remote code execution, privilege escalation, or information disclosure.\nThe vulnerability, now tracked as CVE-2026-9082, carries a CVSS score of 6.5 out of 10.0, per CVE.org. Drupal said the vulnerability resides in a database abstraction API that is", "creation_timestamp": "2026-05-21T01:44:11.000000Z"}, {"uuid": "6d3c44bd-9810-46b7-9e9b-88a1a9d60323", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-9082", "type": "seen", "source": "https://gist.github.com/alon710/f82b2c773fad7c904278334fb63b3ad5", "content": "# CVE-2026-9082: CVE-2026-9082: Unauthenticated SQL Injection in Drupal Core PostgreSQL Driver\n\n&gt; **CVSS Score:** 6.5\n&gt; **Published:** 2026-05-20\n&gt; **Full Report:** https://cvereports.com/reports/CVE-2026-9082\n\n## Summary\nDrupal Core contains a highly critical SQL injection vulnerability (CVE-2026-9082) within its Database Abstraction API. The flaw specifically affects installations using the PostgreSQL database backend, allowing unauthenticated attackers to execute arbitrary SQL commands via crafted array keys in filter parameters.\n\n## TL;DR\nUnauthenticated SQL injection in Drupal Core's PostgreSQL driver allows full database compromise and potential remote code execution via crafted JSON:API or search queries.\n\n## Exploit Status: POC\n\n## Technical Details\n\n- **CWE ID**: CWE-89\n- **Attack Vector**: Network (Unauthenticated)\n- **CVSS v3.1 Score**: 6.5\n- **Drupal Risk Score**: 20/25 (Highly Critical)\n- **Exploit Status**: PoC Available\n- **KEV Status**: Not Listed\n\n## Affected Systems\n\n- Drupal Core 8.9.x to 10.4.9 (with PostgreSQL)\n- Drupal Core 10.5.0 to 10.5.9 (with PostgreSQL)\n- Drupal Core 10.6.0 to 10.6.8 (with PostgreSQL)\n- Drupal Core 11.0.0 to 11.1.9 (with PostgreSQL)\n- Drupal Core 11.2.0 to 11.2.11 (with PostgreSQL)\n- Drupal Core 11.3.0 to 11.3.9 (with PostgreSQL)\n- **Drupal Core**: 8.9.0 - 10.4.9 (Fixed in: `10.4.10`)\n- **Drupal Core**: 10.5.0 - 10.5.9 (Fixed in: `10.5.10`)\n- **Drupal Core**: 10.6.0 - 10.6.8 (Fixed in: `10.6.9`)\n- **Drupal Core**: 11.0.0 - 11.1.9 (Fixed in: `11.1.10`)\n- **Drupal Core**: 11.2.0 - 11.2.11 (Fixed in: `11.2.12`)\n- **Drupal Core**: 11.3.0 - 11.3.9 (Fixed in: `11.3.10`)\n\n## Mitigation\n\n- Apply official Drupal Core security patches immediately\n- Revoke PostgreSQL SUPERUSER privileges from the Drupal database user\n- Deploy WAF rules to filter PostgreSQL-specific syntax from incoming requests\n\n**Remediation Steps:**\n1. Identify the current Drupal Core version via the Composer lockfile\n2. Run `composer update drupal/core drupal/core-recommended` to install the patched release\n3. Verify the PostgreSQL database user permissions using `\\du` in the psql console\n4. Configure SIEM and WAF to monitor for `pg_sleep` and `COPY FROM PROGRAM` patterns\n\n## References\n\n- [Official Drupal Advisory (SA-CORE-2026-004)](https://www.drupal.org/sa-core-2026-004)\n- [CVE-2026-9082 at CVE.org](https://www.cve.org/CVERecord?id=CVE-2026-9082)\n- [NVD Record](https://nvd.nist.gov/vuln/detail/CVE-2026-9082)\n- [GitHub PoC Repository (lysophavin18)](https://github.com/lysophavin18/cve-2026-9082)\n- [GitHub PoC Repository (HORKimhab)](https://github.com/HORKimhab/CVE-2026-9082)\n\n\n---\n*Generated by [CVEReports](https://cvereports.com/reports/CVE-2026-9082) - Automated Vulnerability Intelligence*", "creation_timestamp": "2026-05-21T07:10:50.000000Z"}, {"uuid": "d914aa1a-4900-4012-a2af-27be9e136a9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-9082", "type": "seen", "source": "https://swecyb.com/ap/users/116080658609901341/statuses/116611627224896861", "content": "(kudelskisecurity.com) Highly Critical SQL Injection Vulnerability in Drupal Core Affecting PostgreSQL Backends (CVE-2026-9082)\nNew highly critical unauthenticated SQLi in Drupal Core (CVE-2026-9082) enables RCE on PostgreSQL backends. Immediate patching required.\nIn brief - CVE-2026-9082 is a highly critical unauthenticated SQL injection flaw in Drupal Core affecting PostgreSQL backends. Attackers can execute arbitrary SQL, escalate privileges, or achieve RCE without authentication. Drupal rates this 19/25 and urges immediate patching.\nTechnically - CVE-2026-9082 stems from improper input validation in Drupal\u2019s core API when interacting with PostgreSQL. Attackers can manipulate SQL queries via crafted requests, leading to data exposure, credential theft, or RCE. Exploitation requires no authentication, has low complexity, and affects core functionality. Patches are available for all supported versions.\nSource: https://kudelskisecurity.com/research/critical-drupal-core-sql-injection-vulnerability\n#Cybersecurity #ThreatIntel", "creation_timestamp": "2026-05-21T08:45:33.961838Z"}, {"uuid": "6db0a6cc-e447-4ffe-9b7f-dc4dd2af5f1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-9082", "type": "seen", "source": "https://www.cert.at/de/warnungen/2026/5/kritische-sicherheitslucke-in-drupal-core-updates-verfugbar", "content": "20. Mai 2026\n\nBeschreibung\n\nIn Drupal Core existiert eine SQL-Injection-Schwachstelle in der Datenbank-Abstraktions-API. Speziell gestaltete Anfragen k&ouml;nnen zu beliebigen SQL-Injections f&uuml;hren. Die Schwachstelle ist ausschlie&szlig;lich f&uuml;r Drupal-Installationen relevant, die PostgreSQL als Datenbank einsetzen, und kann ohne Authentifizierung durch anonyme Benutzer:innen ausgenutzt werden.\n\nZus&auml;tzlich zur SQL-Injection enthalten die Drupal-Releases f&uuml;r die unterst&uuml;tzten Versionszweige (11.3, 11.2, 10.6 und 10.5) auch Sicherheitsaktualisierungen f&uuml;r die Abh&auml;ngigkeiten Symfony und Twig. Diese Abh&auml;ngigkeits-Updates betreffen unabh&auml;ngig von der eingesetzten Datenbank alle Drupal-Installationen.\n\nCVE-Nummer(n):&nbsp;CVE-2026-9082\n\nCVSS Base Score: N/A\n\nAuswirkungen\n\nAngreifer:innen k&ouml;nnen ohne Authentifizierung speziell gestaltete Anfragen senden und so beliebigen SQL-Code ausf&uuml;hren. M&ouml;gliche Folgen sind die Offenlegung von Informationen sowie in bestimmten Konstellationen Privilegieneskalation, Remote Code Execution oder weitere Angriffe.\n\nAuch wenn die SQL-Injection nur PostgreSQL-Installationen betrifft, sind durch die mitver&ouml;ffentlichten Updates f&uuml;r Symfony und Twig je nach Konfiguration und eingesetzten Contrib-Modulen alle Drupal-Sites potenziell von weiteren Schwachstellen betroffen.\n\nBetroffene Systeme\n\nDrupal Core in folgenden Versionsbereichen:\n\n\n\nDrupal 11.3.x: Versionen vor 11.3.10\n\nDrupal 11.2.x: Versionen vor 11.2.12\n\nDrupal 11.1.x und 11.0.x: Versionen vor 11.1.10 (End-of-Life)\n\nDrupal 10.6.x: Versionen vor 10.6.9\n\nDrupal 10.5.x: Versionen vor 10.5.10\n\nDrupal 10.4.x und fr&uuml;here 10er-Versionen: vor 10.4.10 (End-of-Life)\n\nDrupal 9.x: alle Versionen (End-of-Life)\n\nDrupal 8.9.x: alle Versionen (End-of-Life)\n\n\nAbhilfe\n\nDrupal stellt f&uuml;r die unterst&uuml;tzten Versionszweige folgende Sicherheitsaktualisierungen bereit:\n\n\n\nDrupal 11.3.x: Update auf 11.3.10\n\nDrupal 11.2.x: Update auf 11.2.12\n\nDrupal 10.6.x: Update auf 10.6.9\n\nDrupal 10.5.x: Update auf 10.5.10\n\n\nF&uuml;r nicht mehr unterst&uuml;tzte Minor-Branches wurden ausschlie&szlig;lich zur Behebung dieser Schwachstelle gezielte Versionen ver&ouml;ffentlicht:\n\n\n\nDrupal 11.1.x und 11.0.x: Update auf 11.1.10\n\nDrupal 10.4.x und fr&uuml;here 10er-Versionen: Update auf 10.4.10\n\n\nAufgrund der Schwere der Schwachstelle stellt Drupal zus&auml;tzlich manuell anzuwendende Patches f&uuml;r die End-of-Life-Versionen Drupal 9.5 und Drupal 8.9 bereit. CERT.at empfiehlt f&uuml;r diese Versionen mittelfristig eine Migration auf einen unterst&uuml;tzten Versionszweig.\n\nSites, die Drupal Steward einsetzen, sind laut Hersteller bereits vor bekannten Angriffsvektoren gesch&uuml;tzt; die Aktualisierung sollte dennoch zeitnah erfolgen.\n\nDa die Aktualisierungen auch Symfony und Twig betreffen, wird empfohlen zu &uuml;berpr&uuml;fen, welche Benutzerrollen Twig-Templates aktualisieren k&ouml;nnen (etwa &uuml;ber Views oder Contrib-Module).\n\nHinweis\n\nGenerell empfiehlt CERT.at, s&auml;mtliche Software aktuell zu halten und dabei insbesondere auf automatische Updates zu setzen. Regelm&auml;&szlig;ige Neustarts stellen sicher, dass diese auch zeitnah aktiviert werden.\n\n\n\nInformationsquelle(n)\n\nDrupal core - Highly critical - SQL injection - SA-CORE-2026-004 (Englisch)https://www.drupal.org/sa-core-2026-004\n\nUpcoming highly critical release on May 20, 2026 - PSA-2026-05-18 (Englisch)https://www.drupal.org/psa-2026-05-18\n\nVorank&uuml;ndigung: Kritische Sicherheitsl&uuml;cke in Drupal Core - Patch-Verf&uuml;gbarkeit am 20. Mai 2026 (Deutsch)https://www.cert.at/de/aktuelles/2026/5/drupal-critical-preannounce", "creation_timestamp": "2026-05-20T18:43:04.000000Z"}, {"uuid": "ecbd9b6b-0fcc-4347-b839-0f0c54be9aa2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-9082", "type": "seen", "source": "https://bsky.app/profile/infosecbriefly.bsky.social/post/3mmebn7z5op2p", "content": "CVE-2026-9082 enables unauthenticated arbitrary SQL injection on Drupal sites using PostgreSQL, potentially leading to privilege escalation and remote code execution.\n", "creation_timestamp": "2026-05-21T11:06:12.257620Z"}, {"uuid": "513426fa-a7bf-4aa6-8781-3e92b675a8be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-9082", "type": "seen", "source": "https://bsky.app/profile/blackhatnews.tokyo/post/3mmebwavli72b", "content": "Drupal\u30b3\u30a2\u306e\u91cd\u5927\u306a\u8106\u5f31\u6027\u304cWeb\u30b5\u30a4\u30c8\u3092\u653b\u6483\u306b\u3055\u3089\u3059\n\nDrupal\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30c1\u30fc\u30e0\u306fSA-CORE-2026-004\u3092\u6b63\u5f0f\u306b\u30ea\u30ea\u30fc\u30b9\u3057\u3001\u307b\u307c\u3059\u3079\u3066\u306e\u30b5\u30dd\u30fc\u30c8\u304a\u3088\u3073\u30ec\u30ac\u30b7\u30fc\u30d0\u30fc\u30b8\u30e7\u30f3\u306eDrupal\u30b3\u30a2\u306e\u30c7\u30fc\u30bf\u30d9\u30fc\u30b9\u62bd\u8c61\u5316API\u5168\u4f53\u306b\u5f71\u97ff\u3092\u4e0e\u3048\u308b\u3001\u6975\u3081\u3066\u91cd\u5927\u306aSQL\u30a4\u30f3\u30b8\u30a7\u30af\u30b7\u30e7\u30f3\u8106\u5f31\u6027\uff08CVE-2026-9082\uff09\u306b\u30d1\u30c3\u30c1\u3092\u5f53\u3066\u307e\u3057\u305f\u3002 Drupal\u306e\u91cd\u5927\u5ea6\u30b9\u30b1\u30fc\u30eb\u30672", "creation_timestamp": "2026-05-21T11:11:15.124342Z"}, {"uuid": "d777dc1f-ad32-45c7-886d-bd6b7be7b316", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-9082", "type": "seen", "source": "https://bsky.app/profile/PostgreSQL.activitypub.awakari.com.ap.brid.gy/post/3mmeckd332ry2", "content": "InfoSec News Nuggets 05/21/2026 Highly Critical Drupal Core Flaw Exposes PostgreSQL Sites to RCE Attacks Drupal released security updates for CVE-2026-9082, a highly critical flaw affecting sites t...\n\n#InfoSec #News #Nuggets #7-Eleven #AboutDFIR #news #nuggets #Webworm\n\nOrigin | Interest | Match", "creation_timestamp": "2026-05-21T11:22:31.480353Z"}, {"uuid": "e2ce5169-a14b-49a5-adcf-516922c16300", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-9082", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3mmet6rlwckz2", "content": "CVE-2026-9082: Highly Critical SQL Injection Vulnerability in Drupal Core (SA-CORE-2026-004) A highly critical SQL injection vulnerability in Drupal core's database abstraction layer affects si...\n\n\nOrigin | Interest | Match", "creation_timestamp": "2026-05-21T16:20:23.151421Z"}, {"uuid": "27b0077d-8534-4b64-ac1d-dc095349dc51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-9082", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/116612335318592781", "content": "\ud83d\udea8 Drupal sites using PostgreSQL face a highly critical SQL injection vuln (CVE-2026-9082), risking RCE &amp; data exposure. Patch versions 11.3, 11.2, 10.6, 10.5.x ASAP. Update Symfony &amp; Twig too. No active exploitation yet. https://radar.offseq.com/threat/drupal-patches-highly-critical-vulnerability-expos-a1486e66 #OffSeq #Drupal #SQLInjection #Infosec", "creation_timestamp": "2026-05-21T11:30:27.615194Z"}, {"uuid": "4cb9b4f6-f66e-4355-9f56-a1c96e3504d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-9082", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3mmefrgg5ee2q", "content": "\ud83d\udd17 CVE : CVE-2026-9082", "creation_timestamp": "2026-05-21T12:20:07.723240Z"}, {"uuid": "ac374916-578d-4ddb-8b80-fb08e3ac7fd6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-9082", "type": "seen", "source": "https://t.me/GithubRedTeam/85199", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #CVE-2026 #POC\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a CVE-2026-9082-Drupal-PoC\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a 7h30th3r0n3\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a Python\n\u2b50 Star\u6570\u91cf\uff1a 0  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 0\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-05-21 10:42:38\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\nDrupal Core PostgreSQL SQL Injection PoC - CVE-2026-9082. Ethical PoC for the Drupal vulnerability allowing anonymous SQL injection through the JSON:API module on PostgreSQL-backed sites.\n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "creation_timestamp": "2026-05-21T11:00:04.000000Z"}, {"uuid": "d377b9db-d8a7-471f-82d2-9a57ee0e162f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-9082", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3mmelom5opvv2", "content": "CVE-2026-9082: Highly Critical SQL Injection Vulnerability in Drupal Core (SA-CORE-2026-004) A highly critical SQL injection vulnerability in Drupal core's database abstraction layer affects si...\n\n\nOrigin | Interest | Match", "creation_timestamp": "2026-05-21T14:06:45.503299Z"}]}