This is a follow-up to https://www.drupal.org/sa-contrib-2022-034, where we identified that the same vulnerability does not exist in Backdrop core. We would like to include the same sanitization tests, so that we can continue to test sanitization against any future changes to link handling.
GitHub Issue #:
5613
Recent comments
You can edit images and load them back to the same folder with the same name and extension, this will not create a problem. Replace directly in the file system, without the use of CMS, for CMS...
Image manipulation on server?
I was under the impression you could not do that - don't know where I got that idea from... thought it had to do with the way Backdrop manages image files.
Image manipulation on server?
I think given the warning on the source site: At this time, if your new project can afford to require PHP 5.5+, which it should, please use PHP's native password_hash() /...
July 31, 2025