Hírolvasó
Real-time SEO for Drupal - Moderately critical - Cross-site Scripting - SA-CONTRIB-2025-091
This module enables you to analyze the content that you're authoring for a website. It shows you a preview of what a search result might look like.
The module doesn't sufficiently escape the metadata from content while rendering the preview, opening up the possibility of a XSS attack.
This vulnerability is mitigated by the fact that an attacker must be able to author content that is analyzed by the Real-Time SEO module.
Solution:Install the latest version:
- Upgrade to yoast_seo 8.x-2.2.
- Pierre Rudloff (prudloff), provisional member of the Drupal Security Team.
- Alexander Varwijk (kingdutch)
- Pierre Rudloff (prudloff), provisional member of the Drupal Security Team.
- Damien McKenna (damienmckenna) of the Drupal Security Team
- Greg Knaddison (greggles) of the Drupal Security Team
- Pierre Rudloff (prudloff), provisional member of the Drupal Security Team
- Jess (xjm) of the Drupal Security Team
Block Attributes - Moderately critical - Cross-site Scripting - SA-CONTRIB-2025-090
This module allows you to define custom attributes for a block. You can specify an attribute name to be added to the block in a predefined format.
The module does not sufficiently validate the provided attributes, which makes it possible to insert JavaScript event attributes such as onmouseover, onkeyup, etc. These attributes can execute JavaScript code when the page is rendered, leading to cross-site scripting (XSS) vulnerabilities.
This vulnerability is partially mitigated by the requirement to manually add the specific attributes and corresponding JavaScript code to the form after the attribute has been created.
Solution:Install the latest version:
- If you use the Block Attributes module for Drupal, upgrade to Block Attributes 8.x-1.1 or Block Attributes 2.0.1.
- Pierre Rudloff (prudloff) provisional member of the Drupal Security Team
- Greg Knaddison (greggles) of the Drupal Security Team
- Juraj Nemec (poker10) of the Drupal Security Team
- Pierre Rudloff (prudloff), provisional member of the Drupal Security Team
- Jess (xjm) of the Drupal Security Team
File Download - Moderately critical - Access bypass - SA-CONTRIB-2025-089
The File Download enables you to allow users to download file and image entities directly using a custom field formatter. It also provides an optional submodule to count and display file downloads in Views, similar to how the core statistics module tracks content views.
The File Download module does not properly validate input when handling file access requests. This can allow users to bypass protections and access private files that should not be publicly available.
Solution:Install the latest version:
- If you use the File Download module for Drupal 8.x, upgrade to File Download 2.0.1 or File Download 8.x-1.9.
- Greg Knaddison (greggles) of the Drupal Security Team
- Juraj Nemec (poker10) of the Drupal Security Team
- Jess (xjm) of the Drupal Security Team
Mail Login - Critical - Access bypass - SA-CONTRIB-2025-088
This module enables users to login by email address with the minimal configurations.
The module included some protection against brute force attacks on the login form, however they were incomplete. An attacker could bypass the brute force protection allowing them to potentially gain access to an account.
Solution:Install the latest version:
- If you use the mail_login 3.x, upgrade to Mail Login 3.2.0
- If you use the mail_login 4.x, upgrade to Mail Login 4.2.0
- Damien McKenna (damienmckenna) of the Drupal Security Team
- Mohammad AlQanneh (mqanneh)
- Greg Knaddison (greggles) of the Drupal Security Team
Cookies Addons - Moderately critical - Cross-site Scripting - SA-CONTRIB-2025-087
This module provides a format filter, which allows you to "disable" iframes (e.g. remove their src attribute) specified by the user. These elements will be enabled again, once the Cookies banner is accepted.
The module doesn't sufficiently filter user-supplied content when their value might contain malicious content leading to a Cross-site Scripting (XSS) vulnerability.
This vulnerability is mitigated by the fact that the site must have the Cookies Addons Embed Iframe submodule enabled and an attacker must have the correct permissions to use a text field with a text format that allows iframes to be used.
Solution:Install the latest version:
- Upgrade to Cookies Addons 1.2.4
- Pierre Rudloff (prudloff) provisional member of the Drupal Security Team
- Greg Knaddison (greggles) of the Drupal Security Team
- Pierre Rudloff (prudloff) provisional member of the Drupal Security Team
Config Pages Viewer - Critical - Access bypass - SA-CONTRIB-2025-086
This module enables you to use config_pages as a content entity.
The module doesn't check permission or entity access before rendering config_pages content.
Solution:Install the latest version:
- If you use the Config Pages Viewer module at version 1.0.3 and lesser, upgrade to Config Pages Viewer 1.0.4.
- Greg Knaddison (greggles) of the Drupal Security Team
- Juraj Nemec (poker10) of the Drupal Security Team
- Jess (xjm) of the Drupal Security Team
Two-factor Authentication (TFA) - Less critical - Access bypass - SA-CONTRIB-2025-085
This module enables you to allow and/or require a second authentication method in addition to password authentication.
The module does not sufficiently ensure that users with enhanced privileges are prevented from viewing recovery codes of other users.
This vulnerability is mitigated by the fact that an attacker must have a role with the Administer TFA for other users permission.
Solution:Install the latest version:
- If you use the Two-factor Authentication (TFA) module for Drupal 8.x, upgrade to Two-factor Authentication (TFA) 8.x-1.11.
- cilefen (cilefen) of the Drupal Security Team
- Dan Smith (galooph) of the Drupal Security Team
- Greg Knaddison (greggles) of the Drupal Security Team
- Jess (xjm) of the Drupal Security Team
Klaro Cookie & Consent Management - Moderately critical - Cross-site Scripting - SA-CONTRIB-2025-080
Klaro Cookie & Consent Management module is used for consent management for cookies and external sources. It makes changes to the markup to enable or disable loading.
The module doesn't sufficiently sanitize some HTML attributes allowing persistent Cross-site Scripting (XSS) attacks.
This vulnerability is mitigated by the fact that an attacker must have a role with permission to enter HTML tags containing specific attributes.
Solution:Install the latest version:
- If you use the Klaro Cookie & Consent Management module for Drupal 10.x/11.x, upgrade to Klaro Cookie & Consent Management 3.0.7
- Pierre Rudloff (prudloff) provisional member of the Drupal Security Team
- Greg Knaddison (greggles) of the Drupal Security Team
- Juraj Nemec (poker10) of the Drupal Security Team
- Pierre Rudloff (prudloff) provisional member of the Drupal Security Team
Open Social - Moderately critical - Cross Site Request Forgery - SA-CONTRIB-2025-079
Open Social is a Drupal distribution for online communities, which ships with a default module that allows users to enroll in events.
The module doesn't sufficiently protect certain routes from Cross Site Request Forgery (CSRF) attacks. Users can be tricked into accepting or rejecting these enrollments.
This issue only affects sites that have event enrollments enabled for an event.
Solution:Install the latest version:
- If you use Open Social 12.3.x upgrade to Open Social 12.3.14
- If you use Open Social 12.4.x upgrade to Open Social 12.4.13
- Ivo Van Geertruyen (mr.baileys) of the Drupal Security Team
- Greg Knaddison (greggles) of the Drupal Security Team
GLightbox - Moderately critical - Cross-site Scripting - SA-CONTRIB-2025-078
GLightbox module is a pure Javascript lightbox for CKEditor.
The module doesn't sufficiently filter user-supplied text for the GLightbox Javascript library leading to a Cross Site Scripting (XSS) vulnerability.
This vulnerability is mitigated by the fact that an attacker must have a role with the permissions to edit content that is configured to support the Glightbox module.
Solution:Install the latest version:
- If you use the GLightbox module, upgrade to GLightbox 1.0.16
- Pierre Rudloff (prudloff) provisional member of the Drupal Security Team
- Greg Knaddison (greggles) of the Drupal Security Team
- Pierre Rudloff (prudloff) provisional member of the Drupal Security Team
Toc.js - Moderately critical - Cross-site Scripting - SA-CONTRIB-2025-077
This module enables you to generate Table of content of your pages given a configuration.
The module doesn't sufficiently sanitise data attributes allowing persistent Cross-site Scripting (XSS) attacks.
This vulnerability is mitigated by the fact that an attacker must have a role with permission to enter HTML tags containing specific data attributes using other modules.
Solution:Install the latest version:
- If you use the Toc JS module, upgrade to Toc Js 3.2.1
- Pierre Rudloff (prudloff) provisional member of the Drupal Security Team
- Flocon de toile (flocondetoile)
- Frank Mably (mably)
- Pierre Rudloff (prudloff) provisional member of the Drupal Security Team
- Greg Knaddison (greggles) of the Drupal Security Team
- Juraj Nemec (poker10) of the Drupal Security Team
- Pierre Rudloff (prudloff) provisional member of the Drupal Security Team