Hírolvasó

Two-factor Authentication (TFA) - Less critical - Access bypass - SA-CONTRIB-2025-085

Biztonsági figyelmeztetések (contrib) - 2025. július 2. 19.37
Project: Two-factor Authentication (TFA)Date: 2025-July-02Security risk: Less critical 9 ∕ 25 AC:Basic/A:Admin/CI:Some/II:None/E:Theoretical/TD:DefaultVulnerability: Access bypassAffected versions: <1.11.0CVE IDs: CVE-2025-7030Description: 

This module enables you to allow and/or require a second authentication method in addition to password authentication.

The module does not sufficiently ensure that users with enhanced privileges are prevented from viewing recovery codes of other users.

This vulnerability is mitigated by the fact that an attacker must have a role with the Administer TFA for other users permission.

Solution: 

Install the latest version:

Reported By: Fixed By: Coordinated By: 

Klaro Cookie & Consent Management - Moderately critical - Cross-site Scripting - SA-CONTRIB-2025-080

Biztonsági figyelmeztetések (contrib) - 2025. június 25. 20.41
Project: Klaro Cookie & Consent ManagementDate: 2025-June-25Security risk: Moderately critical 14 ∕ 25 AC:Basic/A:User/CI:Some/II:Some/E:Theoretical/TD:AllVulnerability: Cross-site ScriptingAffected versions: <3.0.7CVE IDs: CVE-2025-5682Description: 

Klaro Cookie & Consent Management module is used for consent management for cookies and external sources. It makes changes to the markup to enable or disable loading.

The module doesn't sufficiently sanitize some HTML attributes allowing persistent Cross-site Scripting (XSS) attacks.

This vulnerability is mitigated by the fact that an attacker must have a role with permission to enter HTML tags containing specific attributes.

Solution: 

Install the latest version:

Reported By: Fixed By: Coordinated By: 

Open Social - Moderately critical - Cross Site Request Forgery - SA-CONTRIB-2025-079

Biztonsági figyelmeztetések (contrib) - 2025. június 25. 20.41
Project: Open SocialDate: 2025-June-25Security risk: Moderately critical 13 ∕ 25 AC:None/A:User/CI:None/II:Some/E:Theoretical/TD:AllVulnerability: Cross Site Request ForgeryAffected versions: <12.3.14 || >=12.4.0 <12.4.13CVE IDs: CVE-2025-48921Description: 

Open Social is a Drupal distribution for online communities, which ships with a default module that allows users to enroll in events.

The module doesn't sufficiently protect certain routes from Cross Site Request Forgery (CSRF) attacks. Users can be tricked into accepting or rejecting these enrollments.

This issue only affects sites that have event enrollments enabled for an event.

Solution: 

Install the latest version:

Reported By: Fixed By: Coordinated By: 

GLightbox - Moderately critical - Cross-site Scripting - SA-CONTRIB-2025-078

Biztonsági figyelmeztetések (contrib) - 2025. június 25. 20.41
Project: GLightboxDate: 2025-June-25Security risk: Moderately critical 13 ∕ 25 AC:Basic/A:User/CI:Some/II:Some/E:Theoretical/TD:DefaultVulnerability: Cross-site ScriptingAffected versions: <1.0.16CVE IDs: CVE-2025-48922Description: 

GLightbox module is a pure Javascript lightbox for CKEditor.

The module doesn't sufficiently filter user-supplied text for the GLightbox Javascript library leading to a Cross Site Scripting (XSS) vulnerability.

This vulnerability is mitigated by the fact that an attacker must have a role with the permissions to edit content that is configured to support the Glightbox module.

Solution: 

Install the latest version:

Reported By: Fixed By: Coordinated By: 

Toc.js - Moderately critical - Cross-site Scripting - SA-CONTRIB-2025-077

Biztonsági figyelmeztetések (contrib) - 2025. június 25. 20.41
Project: Toc.jsDate: 2025-June-25Security risk: Moderately critical 12 ∕ 25 AC:Basic/A:User/CI:Some/II:Some/E:Theoretical/TD:UncommonVulnerability: Cross-site ScriptingAffected versions: <3.2.1CVE IDs: CVE-2025-48923Description: 

This module enables you to generate Table of content of your pages given a configuration.

The module doesn't sufficiently sanitise data attributes allowing persistent Cross-site Scripting (XSS) attacks.

This vulnerability is mitigated by the fact that an attacker must have a role with permission to enter HTML tags containing specific data attributes using other modules.

Solution: 

Install the latest version:

Reported By: Fixed By: Coordinated By: