The "Simple Klaro" module adds the "Klaro! A Simple Consent Manager" to your website and allows you to configure it according to your needs in the Drupal backend.
The module doesn't sufficiently mark its administrative permission as restricted, creating the possibility for the permission to be granted too broadly. A malicious admin could execute a Cross Site Scripting (XSS) attack.
This vulnerability is mitigated by the fact that an attacker must have a role with the "administer simple klaro" permission.
This module enables you to setup a repeating date rule that users can "book" different dates, allowing you to let users register for a variety of different things like conference rooms or guitar lessons.
This module has a permission of "view booking" and "view booking contact" which allows you to view them regardless of whether you own them or not. Due to bad naming of the permissions it's likely admins have configured those to users that shouldn't have them.
This module integrates Drupal with LightGallery, enabling the use of the LightGallery library with any image field or view.
The module does not adequately sanitize user input in the image field’s "alt" attribute, potentially allowing cross-site scripting (XSS) attacks when tags or scripts are inserted.
This vulnerability is partially mitigated by the requirement that an attacker must have permission to create content containing an image field configured to use the LightGallery format.
The Admin Audit Trail module tracks logs of specific events that you'd like to review. When the submodule Admin Audit Trail: User Authentication is enabled, it logs user authentication events (login, logout, and password reset requests).
The module does not sufficiently limit some large values before logging the data.
This module enables you to pay for Commerce order to an environment provided and secured by the bank
The module doesn't sufficiently verify the payment status on canceled orders. An attacker can issue a specially crafted request to update the order status to completed.
This module enables you to pay for Commerce order to an environment provided and secured by the bank
The module doesn't sufficiently verify the payment status on canceled orders. An attacker can issue a specially crafted request to update the order status to completed.
This module provides a block to easily display a rendered node.
Access to the rendered node isn't validated before rendering the block. Allowing access to node content for users that would normally not be allowed to access the node.
This module enables you to allow users to include a second authentication method in addition to password authentication.
The module doesn't sufficiently prevent TFA from being bypassed when using the REST login routes.
A new requirements check has been added to the status report so other authentication providers can be assessed to check if they also allow for this bypass.
This vulnerability is mitigated by the fact that an attacker must obtain a valid username/password.