Gif Player Field - Moderately critical - Cross site scripting - SA-CONTRIB-2025-032

Date: 
2025-April-09
CVE IDs: 
CVE-2025-31128

Gif Player Field creates a simple file field types that allows you to upload the GIF files and configure the output for this using the Field Formatters.

The module uses GifPlayer jQuery library to render the GIF according to configured setups for the Field Formatter. The external Gif Player Library doesn't satinize the attributes properly when rendering the widget, allowing a malicious user to run XSS attacks.

ECA: Event - Condition - Action - Critical - Cross site request forgery - SA-CONTRIB-2025-031

Date: 
2025-April-09
CVE IDs: 
CVE-2025-3131

This module enables you to define automations on your Drupal site.

The module doesn't sufficiently protect certain routes from CSRF attacks.

This vulnerability can be mitigated by disabling the "eca_ui" submodule, which leaves ECA functionality intact, but the vulnerable routes will no longer be available.

WEB-T - Moderately critical - Access bypass, Denial of service - SA-CONTRIB-2025-030

Date: 
2025-April-09
CVE IDs: 
CVE-2025-3475

This module enables you to translate nodes, configuration, UI strings automatically.

The module doesn't sufficiently validate the incoming API response when using eTranslation integration, which has an asynchronous workflow. Specially crafted requests could overwrite entities and translations of entities with arbitrary content and create load on the system leading to a Denial of Service.

Obfuscate - Moderately critical - Cross Site Scripting - SA-CONTRIB-2025-029

Date: 
2025-April-02
CVE IDs: 
CVE-2025-3130

This module enables you to obfuscate email addresses, to avoid them being easily available to spammers.

The module doesn't sufficiently sanitise input when ROT13 encoding is used.
This vulnerability is mitigated by the fact that an attacker must have a role with the ability to enter specific HTML tag attributes. In a default Drupal installation this would require the administrator role and use of the Full HTML text format. It also requires that the ROT13 encoding be enabled in Obfuscate settings.

Access code - Moderately critical - Access bypass - SA-CONTRIB-2025-028

Date: 
2025-April-02
CVE IDs: 
CVE-2025-3129

This module enables users to log in using a short access code instead of providing a username/password combination.

The module doesn't sufficiently protect against brute force attacks to guess a user's access code.

This vulnerability is mitigated by the fact that access code based logins are off by default and only enabled for accounts that enable it. Sites could mitigate the issue without updating by:

TacJS - Moderately critical - Cross Site Scripting - SA-CONTRIB-2025-027

Date: 
2025-April-02
CVE IDs: 
CVE-2025-31476

This module enables sites to comply with the European cookie law using tarteaucitron.js.

The module doesn't sufficiently filter user-supplied markup inside of content leading to a persistent Cross Site Scripting (XSS) vulnerability.

This vulnerability is mitigated by the fact that an attacker needs to be able to insert specific data attributes in the page.

Drupal core - Moderately critical - Cross Site Scripting - SA-CORE-2025-004

Date: 
2025-March-19
CVE IDs: 
CVE-2025-31675

Drupal core Link field attributes are not sufficiently sanitized, which can lead to a Cross Site Scripting vulnerability (XSS).

This vulnerability is mitigated by that fact that an attacker would need to have the ability to add specific attributes to a Link field, which typically requires edit access via core web services, or a contrib or custom module.

Sites with the Link module disabled or that do not use any link fields are not affected.

Formatter Suite - Moderately critical - Cross site scripting - SA-CONTRIB-2025-026

Date: 
2025-March-19
CVE IDs: 
CVE-2025-31697

Formatter Suite provides a suite of field formatters to help present numbers, dates, times, text, links, entity references, files, and images. The module provides a custom formatter for link fields.

Drupal core does not sufficiently sanitize link element attributes, which can lead to a Cross Site Scripting vulnerability (XSS).

A separate fix for Drupal core has been released but this module requires a concurrent release to make use of the Drupal core fix.

RapiDoc OAS Field Formatter - Moderately critical - Cross site scripting - SA-CONTRIB-2025-025

Date: 
2025-March-19
CVE IDs: 
CVE-2025-31696

This module can be used to render Open API Documentation using the RapiDoc library. The module provides a custom formatter for link fields.

Drupal core does not sufficiently sanitize link element attributes, which can lead to a Cross Site Scripting vulnerability (XSS).

A separate fix for Drupal core has been released but this module requires a concurrent release to make use of the Drupal core fix.

Link field display mode formatter - Moderately critical - Cross site scripting - SA-CONTRIB-2025-024

Date: 
2025-March-19
CVE IDs: 
CVE-2025-31695

This module adds a formatter for link fields that displays the current entity with another view mode inside the link.

Drupal core does not sufficiently sanitize link element attributes, which can lead to a Cross Site Scripting vulnerability (XSS).

A separate fix for Drupal core has been released but this module requires a concurrent release to make use of the Drupal core fix.

Pages

Subscribe with RSS Subscribe to Security advisories