Biztonsági figyelmeztetések (contrib)
Lightgallery - Moderately critical - Cross Site Scripting - SA-CONTRIB-2025-069
This module integrates Drupal with LightGallery, enabling the use of the LightGallery library with any image field or view.
The module does not adequately sanitize user input in the image field’s "alt" attribute, potentially allowing cross-site scripting (XSS) attacks when tags or scripts are inserted.
This vulnerability is partially mitigated by the requirement that an attacker must have permission to create content containing an image field configured to use the LightGallery format.
Solution:Install the latest version:
- If you use the Lightgallery module, upgrade to Lightgallery 8.x-1.6
- Greg Knaddison (greggles) of the Drupal Security Team
- Juraj Nemec (poker10) of the Drupal Security Team
- Pierre Rudloff (prudloff)
Admin Audit Trail - Less critical - Denial of Service - SA-CONTRIB-2025-068
The Admin Audit Trail module tracks logs of specific events that you'd like to review. When the submodule Admin Audit Trail: User Authentication is enabled, it logs user authentication events (login, logout, and password reset requests).
The module does not sufficiently limit some large values before logging the data.
Solution:Install the latest version:
- If you use the Admin Audit Trail module for Drupal 9/10/11, upgrade to Admin Audit Trail 1.0.5
- Greg Knaddison (greggles) of the Drupal Security Team
- Juraj Nemec (poker10) of the Drupal Security Team
Commerce Alphabank Redirect - Moderately critical - Access bypass - SA-CONTRIB-2025-067
This module enables you to pay for Commerce order to an environment provided and secured by the bank
The module doesn't sufficiently verify the payment status on canceled orders. An attacker can issue a specially crafted request to update the order status to completed.
Solution:Install the latest version:
- If you use the commerce_alphabank_redirect module for Drupal 8.x, upgrade to commerce_alphabank_redirect 1.0.3
- Greg Knaddison (greggles) of the Drupal Security Team
- Juraj Nemec (poker10) of the Drupal Security Team
Commerce Eurobank (Redirect) - Moderately critical - Access bypass - SA-CONTRIB-2025-066
This module enables you to pay for Commerce order to an environment provided and secured by the bank
The module doesn't sufficiently verify the payment status on canceled orders. An attacker can issue a specially crafted request to update the order status to completed.
Solution:Install the latest version:
- If you use the commerce_eurobank_redirect module for Drupal 8.x, upgrade to commerce_eurobank_redirect 2.1.1
- Greg Knaddison (greggles) of the Drupal Security Team
- Juraj Nemec (poker10) of the Drupal Security Team
Quick Node Block - Moderately critical - Access bypass - SA-CONTRIB-2025-065
This module provides a block to easily display a rendered node.
Access to the rendered node isn't validated before rendering the block. Allowing access to node content for users that would normally not be allowed to access the node.
Solution:Update to the latest version.
- If you use the Quick Node Block module, update to Quick Node Block 2.0.1
- Greg Knaddison (greggles) of the Drupal Security Team
- Ivo Van Geertruyen (mr.baileys) of the Drupal Security Team
- Juraj Nemec (poker10) of the Drupal Security Team
Quick Node Block - Moderately critical - Access bypass - SA-CONTRIB-2025-064
This module provides a block to easily display a rendered node.
The module doesn't check access to content before displaying it to a visitor, allowing unauthorized users to retrieve a list of labels of all nodes.
Solution:Update to the latest version.
- If you use the Quick Node Block module, update to Quick Node Block 2.0.1
- Greg Knaddison (greggles) of the Drupal Security Team
- Ivo Van Geertruyen (mr.baileys) of the Drupal Security Team
- Juraj Nemec (poker10) of the Drupal Security Team
One Time Password - Moderately critical - Access bypass - SA-CONTRIB-2025-063
This module enables you to allow users to include a second authentication method in addition to password authentication.
The module doesn't sufficiently prevent the same TFA token within a 30 second window.
This vulnerability is mitigated by the fact that an attacker must obtain a valid username/password and second factor.
Solution:Install the latest version:
- If you use the One Time Password module for Drupal, upgrade to One Time Password 8.x-1.3
- danielveza
- Lee Rowlands (larowlan) of the Drupal Security Team
- Ivo Van Geertruyen (mr.baileys) of the Drupal Security Team
- Greg Knaddison (greggles) of the Drupal Security Team
- Juraj Nemec (poker10) of the Drupal Security Team
One Time Password - Moderately critical - Access bypass - SA-CONTRIB-2025-062
This module enables you to allow users to include a second authentication method in addition to password authentication.
The module doesn't sufficiently prevent TFA from being bypassed when using the REST login routes.
A new requirements check has been added to the status report so other authentication providers can be assessed to check if they also allow for this bypass.
This vulnerability is mitigated by the fact that an attacker must obtain a valid username/password.
Solution:Install the latest version:
- If you use the One Time Password module for Drupal, upgrade to One Time Password 8.x-1.3
- danielveza
- Kim Pepper (kim.pepper)
- Lee Rowlands (larowlan) of the Drupal Security Team
- Greg Knaddison (greggles) of the Drupal Security Team
- Juraj Nemec (poker10) of the Drupal Security Team
One Time Password - Moderately critical - Access bypass - SA-CONTRIB-2025-061
This module enables you to allow users to include a second authentication method in addition to password authentication.
The module doesn't sufficiently prevent one time login links from bypassing TFA.
This vulnerability is mitigated by the fact that an attacker must have access to an email account attached to a user or a valid one time password link for a user.
Solution:Install the latest version:
- If you use the One Time Password module for Drupal, upgrade to One Time Password 8.x-1.3
- danielveza
- Kim Pepper (kim.pepper)
- Lee Rowlands (larowlan) of the Drupal Security Team
- Greg Knaddison (greggles) of the Drupal Security Team
- Juraj Nemec (poker10) of the Drupal Security Team
Single Content Sync - Moderately critical - Access bypass - SA-CONTRIB-2025-060
This module enables you to seamlessly migrate and deploy content across environments, eliminating manual steps. It simplifies the process by exporting content to a YML file or a ZIP archive, which can be imported into another environment effortlessly.
While the export feature rightfully bypasses implemented access controls, enabling it to extract all entity data, including private and confidential information, to the mentioned formats, it fails to adequately safeguard the generated output.
This vulnerability is mitigated by the fact that an attacker must have a role with the permission "export single content" or "Allow user to export all content".
Solution:Install the latest version:
- If you use the Single Content Sync module for Drupal, upgrade to Single Content Sync 1.4.12.
- Dave Long (longwave) of the Drupal Security Team
- Dezső Biczó (mxr576)
- Oleksandr Kuzava (nginex)
- Greg Knaddison (greggles) of the Drupal Security Team
- Juraj Nemec (poker10) of the Drupal Security Team
Events Log Track - Moderately critical - Denial of Service - SA-CONTRIB-2025-059
The Events Log Track module enables you to log specific events on a Drupal site.
The module doesn't sufficiently mitigate resource consumption for certain requests which allows a Denial of Service attack.
Solution:Install the latest version:
- If you use the event_log_track_auth_user_login_validate sub-module for Drupal 10.x or 11.x, upgrade to events_log_track 4.0.2 or events_log_track 3.1.11
- Greg Knaddison (greggles) of the Drupal Security Team
Piwik PRO - Moderately critical - Cross Site Scripting - SA-CONTRIB-2025-058
This module enables you to add the Piwik Pro web statistics tracking system to your website.
The module does not check the JS code that is loaded on the website. So a user with the "Administer Piwik Pro" permission could configure the module to load JS from a malicious website.
This vulnerability is mitigated by the fact that an attacker must have a role with the permission "administer piwik pro" to access the settings form where this can be configured.
Solution:Install the latest version:
- If you use the Piwik Pro module, upgrade to Piwik Pro 1.3.2
Sites are encouraged to review which roles have that permission and which users have that role, to ensure that only trusted users have that permission.
Reported By: Fixed By: Coordinated By:- Juraj Nemec (poker10) of the Drupal Security Team
- Pierre Rudloff (prudloff)
Advanced File Destination - Critical - Multiple vulnerabilities - SA-CONTRIB-2025-057
The Advanced File Destination module enhances file upload management in Drupal by allowing users to choose and create custom directories during file uploads.
The module has multiple vulnerabilities that were reported through the Drupal Security Team's coordinated vulnerability process. The project maintainer did not follow the terms and conditions for hosting projects on drupal.org that are opted into security coverage, so the module is losing its security coverage. The private issues may be made public at the discretion of the reporter and maintainer.
Enterprise MFA - TFA for Drupal - Critical - Access bypass - SA-CONTRIB-2025-056
The module enables you to add second-factor authentication in addition to the default Drupal login.
The module does not sufficiently ensure that known login routes are protected.
This vulnerability is mitigated by the fact that an attacker must obtain the user's username and password.
Solution:Install the latest version:
- If you use the Enterprise MFA - TFA module version 5.x for Drupal 9.3 and above, upgrade to miniorange_2fa 5.2.0.
- If you use the Enterprise MFA - TFA module version 4.x for Drupal 8, 9 or 10, upgrade to miniorange_2fa 8.x-4.7.
- Greg Knaddison (greggles) of the Drupal Security Team
- Juraj Nemec (poker10) of the Drupal Security Team
Enterprise MFA - TFA for Drupal - Critical - Access bypass - SA-CONTRIB-2025-055
The module enables you to add second-factor authentication in addition to the default Drupal login.
The module doesn't sufficiently protect certain sensitive routes, allowing an attacker to view or modify various TFA-related settings.
Solution:Install the latest version:
- If you use the Enterprise MFA - TFA module version 5.x for Drupal 9.3 and above, upgrade to miniorange_2fa 5.2.0.
- If you use the Enterprise MFA - TFA module version 4.x for Drupal 8, 9 or 10, upgrade to miniorange_2fa 8.x-4.7.
- Juraj Nemec (poker10) of the Drupal Security Team
- Juraj Nemec (poker10) of the Drupal Security Team
Enterprise MFA - TFA for Drupal - Critical - Cross Site Request Forgery - SA-CONTRIB-2025-054
The module enables you to add second-factor authentication in addition to the default Drupal login.
The module doesn't sufficiently protect certain routes from Cross Site Request Forgery (CSRF) attacks.
Solution:Install the latest version:
- If you use the Enterprise MFA - TFA module version 5.x for Drupal 9.3 and above, upgrade to miniorange_2fa 5.2.0.
- If you use the Enterprise MFA - TFA module version 4.x for Drupal 8, 9 or 10, upgrade to miniorange_2fa 8.x-4.7.
- Juraj Nemec (poker10) of the Drupal Security Team
- Juraj Nemec (poker10) of the Drupal Security Team
Enterprise MFA - TFA for Drupal - Moderately critical - Access bypass - SA-CONTRIB-2025-053
The module enables you to add second-factor authentication in addition to the default Drupal login.
The module doesn't invoke two factor authentication (2FA) for the password reset option.
This vulnerability is mitigated by the fact that an attacker must have access to the password reset link.
Solution:Install the latest version:
- If you use the Enterprise MFA - TFA module version 5.x for Drupal 9.3 and above, upgrade to miniorange_2fa 5.2.0.
- If you use the Enterprise MFA - TFA module version 4.x for Drupal 8, 9 or 10, upgrade to miniorange_2fa 8.x-4.7.
- Greg Knaddison (greggles) of the Drupal Security Team
- Juraj Nemec (poker10) of the Drupal Security Team
Enterprise MFA - TFA for Drupal - Moderately critical - Access bypass - SA-CONTRIB-2025-052
The module enables you to add second-factor authentication in addition to the default Drupal login.
The module doesn't sufficiently check whether the TOTP token is already used or not for authenticator-based second-factor methods.
This vulnerability is mitigated by the fact that an attacker must have a username, password and TOTP token generated within the last 5 minutes.
Solution:Install the latest version:
- If you use the Enterprise MFA - TFA module version 5.x for Drupal 9.3 and above, upgrade to miniorange_2fa 5.2.0.
- If you use the Enterprise MFA - TFA module version 4.x for Drupal 8, 9 or 10, upgrade to miniorange_2fa 8.x-4.7.
- Greg Knaddison (greggles) of the Drupal Security Team
- Juraj Nemec (poker10) of the Drupal Security Team
IFrame Remove Filter - Moderately critical - Cross site scripting - SA-CONTRIB-2025-051
This module enables you to add a filter to text formats (Full HTML, Filtered HTML), which will remove every iframe where the "src" is not on the allowlist.
The module doesn't sufficiently filter these iframes in certain situations.
This vulnerability is mitigated by the fact that an attacker must be able to edit content that allows iframes.
Solution:Install the latest version:
- If you use the IFrame Remove Filter module for Drupal 10.x or 11.x, upgrade to IFrame Remove Filter 2.0.5
- Greg Knaddison (greggles) of the Drupal Security Team
- Drew Webber (mcdruid) of the Drupal Security Team
- Juraj Nemec (poker10) of the Drupal Security Team
Klaro Cookie & Consent Management - Moderately critical - Cross Site Scripting - SA-CONTRIB-2025-050
Klaro Cookie & Consent Management module is used for consent management for cookies and external sources. It makes changes to the markup to enable or disable loading.
The module doesn't sufficiently sanitize data attributes allowing persistent Cross Site Scripting (XSS) attacks.
This vulnerability is mitigated by the fact that an attacker must have a role with permission to enter HTML tags containing specific data attributes.
Solution:Install the latest version:
- If you use the Klaro Cookie & Consent Management module for Drupal 10.x/11.x, upgrade to Klaro Cookie & Consent Management 3.0.5
- Greg Knaddison (greggles) of the Drupal Security Team
- Juraj Nemec (poker10) of the Drupal Security Team