View online: https://www.drupal.org/sa-contrib-2025-060
Project: Single Content Sync [1]
Date: 2025-May-14
Security risk: *Moderately critical* 10 ∕ 25
AC:Complex/A:User/CI:Some/II:None/E:Theoretical/TD:All [2]
Vulnerability: Access bypass
Affected versions: <1.4.12
CVE IDs: CVE-2025-48009
Description:
This module enables you to seamlessly migrate and deploy content across
environments, eliminating manual steps. It simplifies the process by
exporting content to a YML file or a ZIP archive, which can be imported into
another environment effortlessly.
While the export feature rightfully bypasses implemented access controls,
enabling it to extract all entity data, including private and confidential
information, to the mentioned formats, it fails to adequately safeguard the
generated output.
This vulnerability is mitigated by the fact that an attacker must have a role
with the permission "export single content" or "Allow user to export all
content".
Solution:
Install the latest version:
* If you use the Single Content Sync module for Drupal, upgrade to Single
Content Sync 1.4.12. [3]
Reported By:
* Dezső Biczó (mxr576) [4]
Fixed By:
* Dave Long (longwave) [5] of the Drupal Security Team
* Dezső Biczó (mxr576) [6]
* Oleksandr Kuzava (nginex) [7]
Coordinated By:
* Greg Knaddison (greggles) [8] of the Drupal Security Team
* Juraj Nemec (poker10) [9] of the Drupal Security Team
[1] https://www.drupal.org/project/single_content_sync
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/single_content_sync/releases/1.4.12
[4] https://www.drupal.org/u/mxr576
[5] https://www.drupal.org/u/longwave
[6] https://www.drupal.org/u/mxr576
[7] https://www.drupal.org/u/nginex
[8] https://www.drupal.org/u/greggles
[9] https://www.drupal.org/u/poker10
View online: https://www.drupal.org/sa-contrib-2025-058
Project: Piwik PRO [1]
Date: 2025-May-14
Security risk: *Moderately critical* 13 ∕ 25
AC:Basic/A:Admin/CI:Some/II:Some/E:Theoretical/TD:All [2]
Vulnerability: Cross Site Scripting
Affected versions: <1.3.2
CVE IDs: CVE-2025-4415
Description:
This module enables you to add the Piwik Pro web statistics tracking system
to your website.
The module does not check the JS code that is loaded on the website. So a
user with the "Administer Piwik Pro" permission could configure the module to
load JS from a malicious website.
This vulnerability is mitigated by the fact that an attacker must have a role
with the permission "administer piwik pro" to access the settings form where
this can be configured.
Solution:
Install the latest version:
* If you use the Piwik Pro module, upgrade to Piwik Pro 1.3.2 [3]
Sites are encouraged to review which roles have that permission and which
users have that role, to ensure that only trusted users have that permission.
Reported By:
* Pierre Rudloff (prudloff) [4]
Fixed By:
* Hartsak (hartsak) [5]
* Josha Hubbers (joshahubbers) [6]
Coordinated By:
* Juraj Nemec (poker10) [7] of the Drupal Security Team
* Pierre Rudloff (prudloff) [8]
[1] https://www.drupal.org/project/piwik_pro
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/piwik_pro/releases/1.3.2
[4] https://www.drupal.org/u/prudloff
[5] https://www.drupal.org/u/hartsak
[6] https://www.drupal.org/u/joshahubbers-0
[7] https://www.drupal.org/u/poker10
[8] https://www.drupal.org/u/prudloff
View online: https://www.drupal.org/sa-contrib-2025-057
Project: Advanced File Destination [1]
Date: 2025-May-14
Security risk: *Critical* 15 ∕ 25 Critical 16 ∕ 25
AC:Complex/A:Admin/CI:All/II:All/E:Theoretical/TD:All [2]
Vulnerability: Multiple vulnerabilities
Affected versions: *
Description:
The Advanced File Destination module enhances file upload management in
Drupal by allowing users to choose and create custom directories during file
uploads.
The module has multiple vulnerabilities that were reported through the Drupal
Security Team's coordinated vulnerability process. The project maintainer did
not follow the terms and conditions for hosting projects on drupal.org that
are opted into security coverage, so the module is losing its security
coverage. The private issues may be made public at the discretion of the
reporter and maintainer.
[1] https://www.drupal.org/project/advanced_file_destination
[2] https://www.drupal.org/security-team/risk-levels