Token replace system has no access checking

Created on 26 November 2024, 4 months ago

This issue was discussed by the Drupal Security Team, and their decision was that this can be solved in a public issue.

Problem/Motivation

The Drupal token system has an access permissions vulnerability. Currently, there is no way for it to reliably check entity view permissions when replacing tokens, which can lead to inadvertent information disclosure.

Steps to reproduce

When sending an email with token-embedded messages, such as notifying user B about content created by user A:

  1. Token::replace() is called to replace tokens in the email body.
  2. Tokens might embed sensitive information (e.g., the title of a restricted node or user details).
  3. While the calling code (e.g., email notification logic) may verify user B's access to objects in $data, token implementations can define new tokens that query data internally without knowing the recipient (user B).
  4. Hook implementations cannot check access for the recipient because they only know the current user (or none, in cases like cron runs).

Proposed resolution

Add an optional $account parameter to Token::replace() and hook_tokens() to specify the recipient for proper access checks. This should be added via the $options argument to maintain backward compatibility.

Remaining tasks

Determine if adding the $account parameter to $options in Token::replace() and hook_tokens() is the most robust and future-proof solution.

User interface changes

Introduced terminology

API changes

Data model changes

Release notes snippet

📌 Task
Status

Active

Version

11.1 🔥

Component

token system

Created by

🇪🇪Estonia ram4nd Tallinn

Live updates comments and jobs are added and updated live.
  • Security improvements

    It makes Drupal less vulnerable to abuse or misuse. Note, this is the preferred tag, though the Security tag has a large body of issues tagged to it. Do NOT publicly disclose security vulnerabilities; contact the security team instead. Anyone (whether security team or not) can apply this tag to security improvements that do not directly present a vulnerability e.g. hardening an API to add filtering to reduce a common mistake in contributed modules.

Sign in to follow issues

Comments & Activities

Production build 0.71.5 2024