Google Maps: Store Locator - Critical - Unsupported - SA-CONTRIB-2025-038

Date: 
2025-April-16
CVE IDs: 
CVE-2025-3737

The security team is marking this project unsupported. There is a known security issue with the project that has not been fixed by the maintainer. If you would like to maintain this project, please read: https://www.drupal.org/node/251466#s-becoming-owner-maintainer-or-co-mai...

Simple GTM - Critical - Unsupported - SA-CONTRIB-2025-037

Date: 
2025-April-16
CVE IDs: 
CVE-2025-3736

The security team is marking this project unsupported. There is a known security issue with the project that has not been fixed by the maintainer. If you would like to maintain this project, please read: https://www.drupal.org/node/251466#s-becoming-owner-maintainer-or-co-mai...

Panelizer (obsolete) - Critical - Unsupported - SA-CONTRIB-2025-036

Date: 
2025-April-16
CVE IDs: 
CVE-2025-3735

The security team is marking this project unsupported. There is a known security issue with the project that has not been fixed by the maintainer. If you would like to maintain this project, please read: https://www.drupal.org/node/251466#s-becoming-owner-maintainer-or-co-mai...

Stage File Proxy - Moderately critical - Denial of Service - SA-CONTRIB-2025-035

Date: 
2025-April-16
CVE IDs: 
CVE-2025-3734

Stage File Proxy is a general solution for getting production files on a development server on demand.

The module doesn't sufficiently validate the existence of remote files prior to attempting to download and create them. An attacker could send many requests and exhaust disk resources.

This vulnerability is mitigated by the fact it only affects sites where the Origin is configured with a trailing slash. Sites that cannot upgrade immediately can confirm they do not have a trailing slash or remove the trailing slash to mitigate the issue.

baguetteBox.js - Moderately critical - Cross Site Scripting - SA-CONTRIB-2025-034

Date: 
2025-April-16
CVE IDs: 
CVE-2025-3733

The baguetteBox.js module provides integration with baguetteBox.js library.

The module doesn't sufficiently sanitize user-supplied text values leading to a cross site scripting vulnerability.

Panels - Critical - Access bypass - SA-CONTRIB-2025-033

Date: 
2025-April-09
CVE IDs: 
CVE-2025-3474

Panels enables administrators to add page variants within page manager, panelizer, etc to create custom pages.

The module doesn't sufficiently protect sensitive routes, allowing an attacker to view and modify blocks within variants without requiring appropriate permission.

Gif Player Field - Moderately critical - Cross site scripting - SA-CONTRIB-2025-032

Date: 
2025-April-09
CVE IDs: 
CVE-2025-31128

Gif Player Field creates a simple file field types that allows you to upload the GIF files and configure the output for this using the Field Formatters.

The module uses GifPlayer jQuery library to render the GIF according to configured setups for the Field Formatter. The external Gif Player Library doesn't satinize the attributes properly when rendering the widget, allowing a malicious user to run XSS attacks.

ECA: Event - Condition - Action - Critical - Cross site request forgery - SA-CONTRIB-2025-031

Date: 
2025-April-09
CVE IDs: 
CVE-2025-3131

This module enables you to define automations on your Drupal site.

The module doesn't sufficiently protect certain routes from CSRF attacks.

This vulnerability can be mitigated by disabling the "eca_ui" submodule, which leaves ECA functionality intact, but the vulnerable routes will no longer be available.

WEB-T - Moderately critical - Access bypass, Denial of service - SA-CONTRIB-2025-030

Date: 
2025-April-09
CVE IDs: 
CVE-2025-3475

This module enables you to translate nodes, configuration, UI strings automatically.

The module doesn't sufficiently validate the incoming API response when using eTranslation integration, which has an asynchronous workflow. Specially crafted requests could overwrite entities and translations of entities with arbitrary content and create load on the system leading to a Denial of Service.

Obfuscate - Moderately critical - Cross Site Scripting - SA-CONTRIB-2025-029

Date: 
2025-April-02
CVE IDs: 
CVE-2025-3130

This module enables you to obfuscate email addresses, to avoid them being easily available to spammers.

The module doesn't sufficiently sanitise input when ROT13 encoding is used.
This vulnerability is mitigated by the fact that an attacker must have a role with the ability to enter specific HTML tag attributes. In a default Drupal installation this would require the administrator role and use of the Full HTML text format. It also requires that the ROT13 encoding be enabled in Obfuscate settings.

Pages

Subscribe with RSS Subscribe to Security advisories