Zum Inhalt springen.
Sympa Menü

it-securitynotifies - [IT-SecNots] [Security-news] Simple multi step form - Moderately critical - Cross-site Scripting - SA-CONTRIB-2025-116

it-securitynotifies AT lists.piratenpartei.de

Betreff: Sicherheitsankündigungen

Listenarchiv

[IT-SecNots] [Security-news] Simple multi step form - Moderately critical - Cross-site Scripting - SA-CONTRIB-2025-116


Chronologisch Thread  
  • From: security-news AT drupal.org
  • To: security-news AT drupal.org
  • Subject: [IT-SecNots] [Security-news] Simple multi step form - Moderately critical - Cross-site Scripting - SA-CONTRIB-2025-116
  • Date: Wed, 5 Nov 2025 18:09:14 +0000 (UTC)
  • Authentication-results: lists.piratenpartei.de; dkim=pass header.d=drupal.org header.s=default header.b=PZty3LiB; dmarc=pass (policy=none) header.from=drupal.org; spf=pass (lists.piratenpartei.de: domain of security-news-bounces AT drupal.org designates 140.211.166.137 as permitted sender) smtp.mailfrom=security-news-bounces AT drupal.org
  • Dkim-filter: OpenDKIM Filter v2.11.0 smtp4.osuosl.org 208F6416CE
  • Dkim-filter: OpenDKIM Filter v2.11.0 smtp4.osuosl.org C84F041132
  • List-archive: <http://lists.drupal.org/pipermail/security-news/>
  • List-id: <security-news.drupal.org>

View online: https://www.drupal.org/sa-contrib-2025-116

Project: Simple multi step form [1]
Date: 2025-November-05
Security risk: *Moderately critical* 13 ∕ 25
AC:Basic/A:Admin/CI:Some/II:Some/E:Theoretical/TD:All [2]
Vulnerability: Cross-site Scripting

Affected versions: <2.0.0
CVE IDs: CVE-2025-12761
Description: 
This module provides the ability to convert any entity form into a simple
multi-step form.

The module doesn’t sufficiently filter certain user-provided text leading
to a cross-site scripting (XSS) vulnerability.

This vulnerability is mitigated by the fact that an attacker must have a role
with the permission “administer node form display”.

Solution: 
Install the latest version:

* If you use the Simple multi step form module for Drupal, upgrade to a
release from the 2.x branch [3], as the 8.x-1.x branch is now unsupported

Reported By: 
* Ide Braakman (idebr) [4]

Fixed By: 
* Diosbel Mezquía (dmezquia) [5]
* Ide Braakman (idebr) [6]
* Vitaliy Bogomazyuk (vitaliyb98) [7]

Coordinated By: 
* Greg Knaddison (greggles) [8] of the Drupal Security Team
* Ivo Van Geertruyen (mr.baileys) [9] of the Drupal Security Team
* Juraj Nemec (poker10) [10] of the Drupal Security Team

------------------------------------------------------------------------------
Contribution record [11]

[1] https://www.drupal.org/project/simple_multistep
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/simple_multistep/releases/2.1.0
[4] https://www.drupal.org/u/idebr
[5] https://www.drupal.org/u/dmezquia
[6] https://www.drupal.org/u/idebr
[7] https://www.drupal.org/u/vitaliyb98
[8] https://www.drupal.org/u/greggles
[9] https://www.drupal.org/u/mrbaileys
[10] https://www.drupal.org/u/poker10
[11] https://new.drupal.org/contribution-record?source_link=https%3A//www.drupal.org/node/3556248

_______________________________________________
Security-news mailing list
Security-news AT drupal.org
Unsubscribe at https://lists.drupal.org/mailman/listinfo/security-news


  • [IT-SecNots] [Security-news] Simple multi step form - Moderately critical - Cross-site Scripting - SA-CONTRIB-2025-116, security-news, 05.11.2025

Archiv bereitgestellt durch MHonArc 2.6.19+.

Seitenanfang