CVE-2026-0945
Published: 04 February 2026
Summary
CVE-2026-0945 is a high-severity Privilege Defined With Unsafe Actions (CWE-267) vulnerability in Role Delegation Project Role Delegation. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 3.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-6 (Least Privilege) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires timely identification, reporting, and correction of software flaws like the unsafe privilege actions in the Drupal Role Delegation module, directly preventing exploitation via patching to version 1.5.0.
Enforces least privilege by limiting user roles to only essential permissions, mitigating privilege escalation from unsafe actions defined in the vulnerable module.
Provides processes for managing accounts, roles, and privileges, enabling review and restriction of unsafe permissions granted by the Role Delegation module.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Direct privilege escalation vulnerability exploitable by low-privileged authenticated users over the network.
NVD Description
Privilege Defined With Unsafe Actions vulnerability in Drupal Role Delegation allows Privilege Escalation.This issue affects Role Delegation: from 1.3.0 before 1.5.0.
Deeper analysisAI
CVE-2026-0945 is a Privilege Defined With Unsafe Actions vulnerability in the Drupal Role Delegation module that allows privilege escalation. This issue affects Role Delegation versions from 1.3.0 up to but not including 1.5.0. The vulnerability is associated with CWE-267 and has a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
An attacker with low privileges can exploit this vulnerability remotely over the network with low complexity and no user interaction required. Successful exploitation enables high-impact disruption to confidentiality, integrity, and availability within the unchanged scope, facilitating privilege escalation.
The Drupal security advisory SA-CONTRIB-2026-002, available at https://www.drupal.org/sa-contrib-2026-002, provides further details on mitigation steps.
Details
- CWE(s)