View online: https://www.drupal.org/sa-contrib-2025-122
Project: Next.js [1]
Date: 2025-December-03
Security risk: *Critical* 16 ∕ 25
AC:Basic/A:None/CI:Some/II:Some/E:Theoretical/TD:All [2]
Vulnerability: Access bypass
Affected versions: <1.6.4 || >=2.0.0 <2.0.1
CVE IDs: CVE-2025-13984
Description:
This module enables integration between Next.js and Drupal for headless CMS
functionality.
When installed, the module automatically enables cross-origin resource
sharing (CORS) with insecure default settings (Access-Control-Allow-Origin:
*), overriding any services.yml CORS configuration. This allows any origin to
make cross-origin requests to the site without administrator knowledge or
consent.
This vulnerability affects all installations as there are no configuration
options to disable this behavior.
Solution:
There are two steps to resolve the issue: Install the latest version and
review your configuration,
1) Update the module:
* If you use the Next.js module for Drupal 10 or 11, upgrade to Next.js
2.0.1 [3].
* If you use the Next.js module for Drupal 9 (1.x branch), upgrade to
Next.js 1.6.4 [4].
2) After upgrading, review the CORS configuration in
sites/default/services.yml. (See this module's CORS.md for details.).
This is especially important if you previously relied on the automatic
CORS configuration.
Reported By:
* Mike Decker (pookmish) [5]
Fixed By:
* Brian Perry (brianperry) [6]
* Rob Decker (rrrob) [7]
Coordinated By:
* Bram Driesen (bramdriesen) [8] provisional member of the Drupal Security
Team
* Greg Knaddison (greggles) [9] of the Drupal Security Team
* Jess (xjm) [10] of the Drupal Security Team
------------------------------------------------------------------------------
Contribution record [11]
[1] https://www.drupal.org/project/next
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/next/releases/2.0.1
[4] https://www.drupal.org/project/next/releases/1.6.4
[5] https://www.drupal.org/u/pookmish
[6] https://www.drupal.org/u/brianperry
[7] https://www.drupal.org/u/rrrob
[8] https://www.drupal.org/u/bramdriesen
[9] https://www.drupal.org/u/greggles
[10] https://www.drupal.org/u/xjm
[11]
https://new.drupal.org/contribution-record?source_link=https%3A//www.drupal…
View online: https://www.drupal.org/sa-contrib-2025-117
Project: Mini site [1]
Date: 2025-December-03
Security risk: *Moderately critical* 14 ∕ 25
AC:Basic/A:User/CI:Some/II:Some/E:Theoretical/TD:All [2]
Vulnerability: Cross-Site Scripting
Affected versions: <3.0.2
CVE IDs: CVE-2025-13979
Description:
This module allows uploading a zip file and extracting its content in the
public file directory to serve this content from a Drupal website.
These zip files may contain arbitrary HTML or SVG content that could allow
cross-site scripting vulnerabilities. While this is an expected feature, the
module does not sufficiently restrict this functionality to trusted users
with a "restricted access" permission. Users without a restricted permission
should not be able to inject arbitrary JavaScript.
This vulnerability is mitigated by the fact that an attacker must have a role
with the permission /create [bundle] content/ permission.
Solution:
*Two steps are required.* Install the latest version and adjust
configuration:
1) If you use Mini site 2.x or 3.x versions, upgrade to the Mini site 3.0.2
[3].
2) A new /manage minisites/ permission has been added. This new permission
will need to be assigned to a trusted role for the user to be able to
upload the zip file.
Reported By:
* Pierre Rudloff (prudloff) [4] provisional member of the Drupal Security
Team
Fixed By:
* cb_govcms [5]
Coordinated By:
* Greg Knaddison (greggles) [6] of the Drupal Security Team
* Juraj Nemec (poker10) [7] of the Drupal Security Team
* Pierre Rudloff (prudloff) [8] provisional member of the Drupal Security
Team
* Jess (xjm) [9] of the Drupal Security Team
------------------------------------------------------------------------------
Contribution record [10]
[1] https://www.drupal.org/project/minisite
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/minisite/releases/3.0.2
[4] https://www.drupal.org/u/prudloff
[5] https://www.drupal.org/u/cb_govcms
[6] https://www.drupal.org/u/greggles
[7] https://www.drupal.org/u/poker10
[8] https://www.drupal.org/u/prudloff
[9] https://www.drupal.org/u/xjm
[10]
https://new.drupal.org/contribution-record?source_link=https%3A//www.drupal…