Vulnerability from drupal
Published
2025-05-28 17:45
Modified
2025-05-29 18:16
Summary
Details
This module provides a format filter, which allows you to "disable" certain HTML elements (e.g. remove their src attribute) specified by the user. These elements will be enabled again, once the COOKiES banner is accepted.
The module doesn't sufficiently check whether to convert "data-src" attributes to "src" when their value might contain malicious content under the scenario, that module specific classes are set on the HTML element.
This vulnerability is mitigated by the fact that the site must have the COOKiES filter submodule enabled and an attacker must have the correct permissions to have a specific HTML element display for all users, and this HTML element needs to have three concise classes set.
Credits
Pierre Rudloff (prudloff)
www.drupal.org/u/prudloff
{
"affected": [
{
"database_specific": {
"affected_versions": "\u003c1.2.15"
},
"package": {
"ecosystem": "Packagist:https://packages.drupal.org/8",
"name": "drupal/cookies"
},
"ranges": [
{
"database_specific": {
"constraint": "\u003c1.2.15"
},
"events": [
{
"introduced": "0"
},
{
"fixed": "1.2.15"
}
],
"type": "ECOSYSTEM"
}
],
"severity": []
}
],
"aliases": [
"CVE-2025-48914"
],
"credits": [
{
"contact": [
"https://www.drupal.org/u/prudloff"
],
"name": "Pierre Rudloff (prudloff)"
}
],
"details": "This module provides a format filter, which allows you to \"disable\" certain HTML elements (e.g. remove their src attribute) specified by the user. These elements will be enabled again, once the COOKiES banner is accepted.\n\nThe module doesn\u0027t sufficiently check whether to convert \"data-src\" attributes to \"src\" when their value might contain malicious content under the scenario, that module specific classes are set on the HTML element.\n\nThis vulnerability is mitigated by the fact that the site must have the COOKiES filter submodule enabled and an attacker must have the correct permissions to have a specific HTML element display for all users, and this HTML element needs to have three concise classes set.",
"id": "DRUPAL-CONTRIB-2025-075",
"modified": "2025-05-29T18:16:19.000Z",
"published": "2025-05-28T17:45:37.000Z",
"references": [
{
"type": "WEB",
"url": "https://www.drupal.org/sa-contrib-2025-075"
}
],
"schema_version": "1.7.0"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…