Zum Inhalt springen.
Sympa Menü

it-securitynotifies - [IT-SecNots] [Security-news] Calculation Fields - Moderately critical - Cross-site Scripting - SA-CONTRIB-2026-023

it-securitynotifies AT lists.piratenpartei.de

Betreff: Sicherheitsankündigungen

Listenarchiv

[IT-SecNots] [Security-news] Calculation Fields - Moderately critical - Cross-site Scripting - SA-CONTRIB-2026-023


Chronologisch Thread  
  • From: security-news AT drupal.org
  • To: security-news AT drupal.org
  • Subject: [IT-SecNots] [Security-news] Calculation Fields - Moderately critical - Cross-site Scripting - SA-CONTRIB-2026-023
  • Date: Wed, 4 Mar 2026 17:58:56 +0000
  • Archived-at: <https://lists.drupal.org/mailman3/hyperkitty/list/security-news AT drupal.org/message/7QBB7BBZB7GSELW3ZRWWY6BXETJ3XOSD/>
  • Authentication-results: lists.piratenpartei.de; dkim=pass header.d=drupal.org header.s=default header.b=NCJvcYwp; dkim=fail ("body hash did not verify") header.d=drupal.org header.s=f34odw3mfzgsrgyn3evjayysxxl6jizn header.b=NyzSxQQY; dkim=fail ("body hash did not verify") header.d=amazonses.com header.s=gdwg2y3kokkkj5a55z2ilkup5wp5hhxx header.b=hr3e2awW; dmarc=pass (policy=none) header.from=drupal.org; spf=pass (lists.piratenpartei.de: domain of security-news-bounces AT drupal.org designates 2605:bc80:3010::138 as permitted sender) smtp.mailfrom=security-news-bounces AT drupal.org
  • Dkim-filter: OpenDKIM Filter v2.11.0 smtp1.osuosl.org 81DB28387D
  • Dkim-filter: OpenDKIM Filter v2.11.0 smtp3.osuosl.org A273C60B0A
  • Dmarc-filter: OpenDMARC Filter v1.4.2 smtp3.osuosl.org A273C60B0A
  • Feedback-id: ::1.us-west-2.eaokZ1GT8utLqfMHQoyOsEFVrSIzzS6R+14LP6WIIUY=:AmazonSES
  • List-archive: <https://lists.drupal.org/mailman3/hyperkitty/list/security-news AT drupal.org/>
  • List-id: <security-news.drupal.org>

View online: https://www.drupal.org/sa-contrib-2026-023

Project: Calculation Fields [1]
Date: 2026-March-04
Security risk: *Moderately critical* 14 ∕ 25
AC:Basic/A:None/CI:Some/II:Some/E:Theoretical/TD:Uncommon [2]
Vulnerability: Cross-site Scripting

Affected versions: <1.0.4
CVE IDs: CVE-2026-3528
Description: 
This module extends the Drupal form API adding "Calculation element" form
element types, which can evaluate a maths expression. It offers webform
integration.

The module doesn't sufficiently validate user input; this could be exploited
to achieve Information Disclosure or Cross-site Scripting (XSS).

Solution: 
Install the latest version:

* If you use the Calculation fields module, upgrade to Calculation fields
1.0.4 [3]

Reported By: 
* Drew Webber (mcdruid) [4] of the Drupal Security Team

Fixed By: 
* Joao Paulo Constantino (joaopauloc.dev) [5]

Coordinated By: 
* Greg Knaddison (greggles) [6] of the Drupal Security Team
* Drew Webber (mcdruid) [7] of the Drupal Security Team
* Juraj Nemec (poker10) [8] of the Drupal Security Team

------------------------------------------------------------------------------
Contribution record [9]

[1] https://www.drupal.org/project/calculation_fields
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/calculation_fields/releases/1.0.4
[4] https://www.drupal.org/u/mcdruid
[5] https://www.drupal.org/u/joaopaulocdev
[6] https://www.drupal.org/u/greggles
[7] https://www.drupal.org/u/mcdruid
[8] https://www.drupal.org/u/poker10
[9] https://new.drupal.org/contribution-record?source_link=https%3A//www.drupal.org/node/3577068

_______________________________________________
Security-news mailing list -- security-news AT drupal.org
To unsubscribe send an email to security-news-leave AT drupal.org
Unsubscribe at

  • [IT-SecNots] [Security-news] Calculation Fields - Moderately critical - Cross-site Scripting - SA-CONTRIB-2026-023, security-news, 04.03.2026

Archiv bereitgestellt durch MHonArc 2.6.19+.

Seitenanfang