SD Breadcrumb provides advanced breadcrumb management for Drupal 11.3+ sites with customizable patterns, icon support, and flexible configuration at both content-type and node levels. Unlike existing breadcrumb modules (Easy Breadcrumb, Menu Breadcrumb), SD Breadcrumb offers a visual builder, per-node overrides, icon support with media library integration, and dual-mode operation (system default or fully custom patterns).

Why This Module is Different:
Easy Breadcrumb: Simpler but lacks visual builder, per-node customization, and icon support
Menu Breadcrumb: Strictly menu-based; SD Breadcrumb offers path-based AND custom patterns
Custom Breadcrumbs: Older, not maintained for recent Drupal versions

SD Breadcrumb fills the gap by providing enterprise-level breadcrumb management with an intuitive UI that requires no coding.

Project link

https://www.drupal.org/project/sd_breadcrumb

Comments

sushant-d created an issue. See original summary.

sushant-d’s picture

vishal.kadam’s picture

Title: Application for Security Advisory Coverage: SD Breadcrumb » [1.x] Breadcrumb Pro
Assigned: sushant-d » Unassigned
Category: Support request » Task
Issue summary: View changes
Priority: Major » Normal
Issue tags: -Needs security review, -Module review
vishal.kadam’s picture

Issue summary: View changes
mxr10’s picture

I reviewed the SD Breadcrumb Pro module code for security issues.

## Files Reviewed
- sd_breadcrumb.module
- src/Breadcrumb/SdBreadcrumbBuilder.php
- src/Controller/PreviewController.php
- src/Form/SettingsForm.php
- src/Form/BreadcrumbPatternForm.php
- src/Service/PatternManager.php
- src/Service/BreadcrumbGenerator.php
- js/breadcrumb-builder.js

## Security Analysis

✅ **XSS Prevention**: The module properly validates user input using `strip_tags()` in both `sd_breadcrumb_node_form_validate()` and `BreadcrumbPatternForm::validateForm()` to prevent HTML injection in breadcrumb labels.

✅ **Form API**: All forms use Drupal's Form API correctly with proper validation handlers.

✅ **Database Queries**: Uses Drupal's database abstraction layer with proper placeholders in `BreadcrumbGenerator.php`.

✅ **Entity Access**: Uses `entity_autocomplete` form elements which respect entity access permissions.

✅ **Configuration**: Uses Drupal's Config API for storing patterns and settings.

✅ **Translations**: All user-facing strings use `t()` or `$this->t()`.

## Minor Suggestions (not security issues)
- Remove .DS_Store files from repository
- Consider reducing debug logging in production
- Remove commented code in .module file

## Conclusion
The code follows Drupal security best practices. No security vulnerabilities found.

Setting to RTBC.

rushikesh raval’s picture

Thank you for applying!

Please read Review process for security advisory coverage: What to expect for more details and Security advisory coverage application checklist to understand what reviewers look for. Tips for ensuring a smooth review gives some hints for a smoother review.

The important notes are the following.

  • If you have not done it yet, you should enable GitLab CI for the project and fix the PHP_CodeSniffer errors/warnings it reports.
  • For the time this application is open, only your commits are allowed.
  • The purpose of this application is giving you a new drupal.org role that allows you to opt projects into security advisory coverage, either projects you already created, or projects you will create. The project status will not be changed by this application; once this application is closed, you will be able to change the project status from Not covered to Opt into security advisory coverage. This is possible only 14 days after the project is created.


    Keep in mind that once the project is opted into security advisory coverage, only Security Team members may change coverage.
  • Only the person who created the application will get the permission to opt projects into security advisory coverage. No other person will get the same permission from the same application; that applies also to co-maintainers/maintainers of the project used for the application.
  • We only accept an application per user. If you change your mind about the project to use for this application, or it is necessary to use a different project for the application, please update the issue summary with the link to the correct project and the issue title with the project name and the branch to review.

To the reviewers

Please read How to review security advisory coverage applications, Application workflow, What to cover in an application review, and Tools to use for reviews.

The important notes are the following.

  • It is preferable to wait for a project moderator before posting the first comment on newly created applications. Project moderators will do some preliminary checks that are necessary before any change on the project files is suggested.
  • Reviewers should show the output of a CLI tool only once per application.
  • It may be best to have the applicant fix things before further review.

For new reviewers, I would also suggest to first read In which way the issue queue for coverage applications is different from other project queues.

vishal.kadam’s picture

Priority: Normal » Major

I am changing priority as per Issue priorities.

batigolix’s picture

Status: Needs review » Needs work

The module still needs quite a bit of work.

Here are some things to start with.

(*) No GitLab CI configuration — The .gitlab-ci.yml file is entirely missing. GitLab CI is the first step toward quality for contributed modules and is expected for the security coverage application. See GitLab CI Templates.

(*) XSS in PreviewControllerPreviewController.php:103 concatenates unsanitized $label directly into #markup.The $label value comes from stored pattern segments. While admin-entered, stored XSS is still a risk. Use Html::escape() or render arrays with
#plain_text instead. See writing secure code for Drupal.

(*) Debug logging left in production codeSdBreadcrumbBuilder.php:177 logs print_r($pattern, TRUE) and line 227 logs print_r($segments, TRUE) to
the logger on every node page view. The .module file (lines 62, 73) also logs per-segment data on every preprocess. This causes severe log noise, performance degradation, and potential information disclosure. Remove all debug logging before release.