Description
XML Injection (aka Blind XPath Injection) vulnerability in Drupal Central Authentication System (CAS) Server allows Privilege Escalation.This issue affects Central Authentication System (CAS) Server: from 0.0.0 before 2.0.3, from 2.1.0 before 2.1.2.
Published: 2026-02-04
Score: 4.2 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Assess Impact
AI Analysis

Impact

Drupal's Central Authentication System (CAS) Server contains an XML Injection vulnerability, also known as Blind XPath Injection. The flaw allows a malicious actor to inject crafted XML elements that are interpreted by the server’s XML processing engine. By manipulating the XML payload, an attacker can gain elevated privileges within the CAS system, potentially accessing or modifying data reserved for higher‑privileged users.

Affected Systems

The vulnerability impacts Drupal Central Authentication System (CAS) Server versions prior to 2.0.3 (including 0.0.0 up to 2.0.2) and prior to 2.1.2 (including 2.1.0 and 2.1.1). Systems running any of those releases should be considered at risk.

Risk and Exploitability

The CVSS v3.1 score is 4.2, indicating low to moderate impact. The EPSS is below 1%, suggesting a very low probability of exploitation in current real‑world activity, and the flaw is not listed in the CISA KEV catalog. Likely the attack requires authenticated access to the CAS server’s XML endpoints, or an attacker that can inject XML payloads into the system. Without further data the exact vector is not specified, so we infer that exploitation would involve sending malicious XML to a vulnerable endpoint and that privileged escalation would result from re‑interpreting that XML as higher‑privileged requests.

Generated by OpenCVE AI on April 17, 2026 at 23:13 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Central Authentication System (CAS) Server to version 2.0.3 or later, or to 2.1.2 or later, if available from the vendor.
  • If an upgrade is not immediately possible, enforce strict validation of all XML inputs or disable XML input handling for untrusted sources to prevent injection.
  • Implement audit logging and monitoring for privilege changes, and ensure the principle of least privilege is applied to all CAS server accounts to limit damage if escalation occurs.

Generated by OpenCVE AI on April 17, 2026 at 23:13 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

References
History

Wed, 11 Feb 2026 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Jtenman
Jtenman central Authentication System Server
CPEs cpe:2.3:a:jtenman:central_authentication_system_server:*:*:*:*:*:drupal:*:*
Vendors & Products Jtenman
Jtenman central Authentication System Server

Thu, 05 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.2, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 05 Feb 2026 11:45:00 +0000

Type Values Removed Values Added
First Time appeared Drupal
Drupal central Authentication System (cas) Server
Vendors & Products Drupal
Drupal central Authentication System (cas) Server

Wed, 04 Feb 2026 20:45:00 +0000

Type Values Removed Values Added
Description XML Injection (aka Blind XPath Injection) vulnerability in Drupal Central Authentication System (CAS) Server allows Privilege Escalation.This issue affects Central Authentication System (CAS) Server: from 0.0.0 before 2.0.3, from 2.1.0 before 2.1.2.
Title Central Authentication System (CAS) Server - Less critical - XML Element Injection - SA-CONTRIB-2026-007
Weaknesses CWE-91
References

Subscriptions

Drupal Central Authentication System (cas) Server
Jtenman Central Authentication System Server
cve-icon MITRE

Status: PUBLISHED

Assigner: drupal

Published:

Updated: 2026-02-05T15:15:29.323Z

Reserved: 2026-01-28T17:01:09.595Z

Link: CVE-2026-1554

cve-icon Vulnrichment

Updated: 2026-02-05T15:12:53.540Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-04T21:15:59.427

Modified: 2026-02-11T19:18:19.747

Link: CVE-2026-1554

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T23:15:30Z

Weaknesses