it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
[IT-SecNots] [Security-news] Orejime - Moderately critical - Cross-site scripting - SA-CONTRIB-2026-032
Chronologisch Thread
- From: security-news AT drupal.org
- To: security-news AT drupal.org
- Subject: [IT-SecNots] [Security-news] Orejime - Moderately critical - Cross-site scripting - SA-CONTRIB-2026-032
- Date: Wed, 8 Apr 2026 16:09:55 +0000
- Archived-at: <https://lists.drupal.org/mailman3/hyperkitty/list/security-news AT drupal.org/message/E35RK3WWOKX74332DDH3NO2FLIKPGTZY/>
- Authentication-results: lists.piratenpartei.de; dkim=pass header.d=drupal.org header.s=default header.b=eDTanUkJ; dkim=fail ("body hash did not verify") header.d=drupal.org header.s=f34odw3mfzgsrgyn3evjayysxxl6jizn header.b=Q5fbGkxw; dkim=fail ("body hash did not verify") header.d=amazonses.com header.s=hsbnp7p3ensaochzwyq5wwmceodymuwv header.b=tnqygnWi; dmarc=pass (policy=none) header.from=drupal.org; spf=pass (lists.piratenpartei.de: domain of security-news-bounces AT drupal.org designates 140.211.166.137 as permitted sender) smtp.mailfrom=security-news-bounces AT drupal.org
- Dkim-filter: OpenDKIM Filter v2.11.0 smtp4.osuosl.org 90BC34100E
- Dkim-filter: OpenDKIM Filter v2.11.0 smtp3.osuosl.org 41238605A0
- Dmarc-filter: OpenDMARC Filter v1.4.2 smtp3.osuosl.org 41238605A0
- Feedback-id: ::1.us-west-2.eaokZ1GT8utLqfMHQoyOsEFVrSIzzS6R+14LP6WIIUY=:AmazonSES
- List-archive: <https://lists.drupal.org/mailman3/hyperkitty/list/security-news AT drupal.org/>
- List-id: <security-news.drupal.org>
View online: https://www.drupal.org/sa-contrib-2026-032
Project: Orejime [1]
Date: 2026-April-08
Security risk: *Moderately critical* 13 ∕ 25
AC:Basic/A:User/CI:Some/II:Some/E:Theoretical/TD:Default [2]
Vulnerability: Cross-site scripting
Affected versions: <2.0.16
Description:
The IframeConsent element writes HTML attributes without escaping their
value.
This module has a XSS vulnerability. If an attacker is able to write an
tag, they may be able to insert arbitrary JavaScript.
This vulnerability is mitigated by the fact that a text format that allows
iframe-consent HTML tags with alt attributes in the necessary option (/Enable
JS Iframe consent/) must be enabled, and an attacker must have a role
allowing the creation or modification of content in a field with text the
format.
Solution:
Install the latest version:
* If you use the 2.x branch of Orejime, upgrade to Orejime 2.0.16 [3].
Reported By:
* Pierre Rudloff (prudloff) [4] of the Drupal Security Team
Fixed By:
* Fabien Gutknecht (fabsgugu) [5]
* Pierre Rudloff (prudloff) [6] of the Drupal Security Team
Coordinated By:
* Juraj Nemec (poker10) [7] of the Drupal Security Team
* Pierre Rudloff (prudloff) [8] of the Drupal Security Team
* Jess (xjm) [9] of the Drupal Security Team
------------------------------------------------------------------------------
Contribution record [10]
[1] https://www.drupal.org/project/orejime
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/orejime/releases/2.0.16
[4] https://www.drupal.org/u/prudloff
[5] https://www.drupal.org/u/fabsgugu
[6] https://www.drupal.org/u/prudloff
[7] https://www.drupal.org/u/poker10
[8] https://www.drupal.org/u/prudloff
[9] https://www.drupal.org/u/xjm
[10] https://new.drupal.org/contribution-record?source_link=https%3A//www.drupal.org/node/3583703
_______________________________________________
Security-news mailing list -- security-news AT drupal.org
To unsubscribe send an email to security-news-leave AT drupal.org
Unsubscribe at
- [IT-SecNots] [Security-news] Orejime - Moderately critical - Cross-site scripting - SA-CONTRIB-2026-032, security-news, 08.04.2026
Archiv bereitgestellt durch MHonArc 2.6.19+.