Simple multi step form - Moderately critical - Cross-site Scripting - SA-CONTRIB-2025-116

Date: 
2025-November-05
CVE IDs: 
CVE-2025-12761

This module provides the ability to convert any entity form into a simple multi-step form.

The module doesn’t sufficiently filter certain user-provided text leading to a cross-site scripting (XSS) vulnerability.

This vulnerability is mitigated by the fact that an attacker must have a role with the permission “administer node form display”.

Email TFA - Moderately critical - Access bypass - SA-CONTRIB-2025-115

Date: 
2025-November-05
CVE IDs: 
CVE-2025-12760

The Email TFA module provides additional email-based two-factor authentication for Drupal logins.

In certain scenarios, the module does not fully protect all login mechanisms as expected.

This issue is mitigated by the fact that an attacker must already have valid user credentials (username and password) to take advantage of the weakness.

Normal Drupal core security window rescheduled for November 12, 2025 due to DrupalCon - PSA-2025-11-03

Date: 
2025-November-03

The upcoming Drupal core security release window has been rescheduled from November 19, 2025 to November 12, 2025. As normal, the window will occur between 1600 UTC and 2200 UTC.

Simple OAuth (OAuth2) & OpenID Connect - Critical - Access bypass - SA-CONTRIB-2025-114

Date: 
2025-October-29
CVE IDs: 
CVE-2025-12466

This module introduces an OAuth 2.0 authorization server, which can be configured to protect your Drupal instance with access tokens, or allow clients to request new access tokens and refresh them.

The module doesn't sufficiently respect granted scopes, it affects all access checks that are based on roles. For example: routes that have the _role requirement, can be bypassed with an access token.

CivicTheme Design System - Moderately critical - Cross-site Scripting - SA-CONTRIB-2025-113

Date: 
2025-October-22
CVE IDs: 
CVE-2025-12083

CivicTheme is a design system and theme framework used to build content-rich Drupal websites. It includes editorial workflows, structured content types, and flexible theming components.

CivicTheme does not sufficiently filter field data before rendering them in Twig templates. This combined with multiple instances of the Twig raw filter throughout CivicTheme components, allows for the injection of malicious scripts in browser contexts.

CivicTheme Design System - Moderately critical - Information disclosure - SA-CONTRIB-2025-112

Date: 
2025-October-22
CVE IDs: 
CVE-2025-12082

CivicTheme is a design system and theme framework used to build content-rich Drupal websites. It includes editorial workflows, structured content types, and flexible theming components.

The theme doesn't sufficiently check access to entities when they are displayed as reference cards used in manual lists, which leads to an information disclosure vulnerability

Reverse Proxy Header - Less critical - Access bypass - SA-CONTRIB-2025-111

Date: 
2025-September-24
CVE IDs: 
CVE-2025-10929

This module allows you to specify an HTTP header name to determine the client's IP address.

The module doesn't sufficiently handle all cases under the scenario if Drupal Core settings $settings['reverse_proxy'] is set to TRUE and $settings['reverse_proxy_addresses'] is configured.

This vulnerability allows an attacker to spoof a request IP address (as Drupal sees it), potentially bypassing a variety of controls.

Currency - Moderately critical - Cross Site Request Forgery - SA-CONTRIB-2025-110

Date: 
2025-September-24
CVE IDs: 
CVE-2025-10930

This module allows you to use different currencies on your website and do currency conversion.

The module doesn't sufficiently protect routes used to enable and disable currencies from Cross-Site Request Forgery (CSRF) attacks, potentially allowing an attacker to trick an admin into changing settings.

Umami Analytics - Moderately critical - Cross Site Scripting - SA-CONTRIB-2025-109

Date: 
2025-September-24
CVE IDs: 
CVE-2025-10931

This module enables you to add Umami Analytics web statistics tracking system to your website.

The "administer umami analytics" permission allows inserting an arbitrary JavaScript file on every page. While this is an expected feature, the permission lacks the "restrict access" flag, which should alert administrators that this permission is potentially dangerous and can lead to cross-site scripting (XSS) vulnerabilities.

This vulnerability is mitigated by the fact that an attacker must have a role with the permission “administer umami analytics”.

Access code - Moderately critical - Access bypass - SA-CONTRIB-2025-108

Date: 
2025-September-24
CVE IDs: 
CVE-2025-10928

This module enables users to sign in with an access code instead of entering user names and passwords. When users are allowed to pick their own access codes, they can guess other users' access codes based on the fact that access codes need to be unique and the system warns if the code of their choice is taken.

This vulnerability is mitigated by the fact that an attacker must have a role with the "change own access code" permission.

Pages

Subscribe with RSS Subscribe to Security advisories