View online: https://www.drupal.org/sa-contrib-2026-003
Project: AT Internet SmartTag [1]
Date: 2026-January-14
Security risk: *Moderately critical* 13 ∕ 25
AC:Basic/A:Admin/CI:Some/II:Some/E:Theoretical/TD:All [2]
Vulnerability: Cross-site Scripting
Affected versions: <1.0.1
CVE IDs: CVE-2026-0946
Description:
This module integrates the AT Internet SmartTag service.
The module does not filter administrator-entered text leading to a persistent
Cross-site Scripting (XSS) vulnerability.
This vulnerability is mitigated by the fact that an attacker must have a role
with the permission "administer atsmarttag".
Solution:
Install the latest version and confirm the permissions associated with the
module are assigned to appropriate roles.
* If you use the AT Internet SmartTag module for Drupal 9 and 10, upgrade to
AT Internet SmartTag 1.0.1 [3]
Reported By:
* Pierre Rudloff (prudloff) [4] provisional member of the Drupal Security
Team
Fixed By:
* Frank Mably (mably) [5]
Coordinated By:
* Greg Knaddison (greggles) [6] of the Drupal Security Team
* Juraj Nemec (poker10) [7] of the Drupal Security Team
------------------------------------------------------------------------------
Contribution record [8]
[1] https://www.drupal.org/project/atsmarttag
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/atsmarttag/releases/1.0.1
[4] https://www.drupal.org/u/prudloff
[5] https://www.drupal.org/u/mably
[6] https://www.drupal.org/u/greggles
[7] https://www.drupal.org/u/poker10
[8]
https://new.drupal.org/contribution-record?source_link=https%3A//www.drupal…
View online: https://www.drupal.org/sa-contrib-2026-002
Project: Role Delegation [1]
Date: 2026-January-14
Security risk: *Moderately critical* 13 ∕ 25
AC:Basic/A:User/CI:Some/II:Some/E:Theoretical/TD:Default [2]
Vulnerability: Access bypass
Affected versions: >=1.3.0 <1.5.0
CVE IDs: CVE-2026-0945
Description:
This module allows site administrators to grant specific roles the authority
to assign selected roles to users, without them needing the "administer
permissions" permission.
The module contains an access bypass vulnerability when used in combination
with the Views Bulk Operations module. A user with the ability to delegate a
role is also able to assign the administrator role, including to their own
user.
This vulnerability is mitigated by the fact that an attacker must have access
to a view of users with the Views Bulk Operations module enabled.
Solution:
Install the latest version:
* If you use the Role Delegation module for Drupal ^10.3 || ^11, upgrade to
Role Delegation 8.x-1.5 [3]
Reported By:
* Drew Webber (mcdruid) [4] of the Drupal Security Team
Fixed By:
* Adam Bramley (acbramley) [5]
* Dieter Holvoet (dieterholvoet) [6]
Coordinated By:
* Greg Knaddison (greggles) [7] of the Drupal Security Team
* Drew Webber (mcdruid) [8] of the Drupal Security Team
* Juraj Nemec (poker10) [9] of the Drupal Security Team
------------------------------------------------------------------------------
Contribution record [10]
[1] https://www.drupal.org/project/role_delegation
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/role_delegation/releases/8.x-1.5
[4] https://www.drupal.org/u/mcdruid
[5] https://www.drupal.org/u/acbramley
[6] https://www.drupal.org/u/dieterholvoet
[7] https://www.drupal.org/u/greggles
[8] https://www.drupal.org/u/mcdruid
[9] https://www.drupal.org/u/poker10
[10]
https://new.drupal.org/contribution-record?source_link=https%3A//www.drupal…
View online: https://www.drupal.org/sa-contrib-2025-122
Project: Next.js [1]
Date: 2025-December-03
Security risk: *Critical* 16 ∕ 25
AC:Basic/A:None/CI:Some/II:Some/E:Theoretical/TD:All [2]
Vulnerability: Access bypass
Affected versions: <1.6.4 || >=2.0.0 <2.0.1
CVE IDs: CVE-2025-13984
Description:
This module enables integration between Next.js and Drupal for headless CMS
functionality.
When installed, the module automatically enables cross-origin resource
sharing (CORS) with insecure default settings (Access-Control-Allow-Origin:
*), overriding any services.yml CORS configuration. This allows any origin to
make cross-origin requests to the site without administrator knowledge or
consent.
This vulnerability affects all installations as there are no configuration
options to disable this behavior.
Solution:
There are two steps to resolve the issue: Install the latest version and
review your configuration,
1) Update the module:
* If you use the Next.js module for Drupal 10 or 11, upgrade to Next.js
2.0.1 [3].
* If you use the Next.js module for Drupal 9 (1.x branch), upgrade to
Next.js 1.6.4 [4].
2) After upgrading, review the CORS configuration in
sites/default/services.yml. (See this module's CORS.md for details.).
This is especially important if you previously relied on the automatic
CORS configuration.
Reported By:
* Mike Decker (pookmish) [5]
Fixed By:
* Brian Perry (brianperry) [6]
* Rob Decker (rrrob) [7]
Coordinated By:
* Bram Driesen (bramdriesen) [8] provisional member of the Drupal Security
Team
* Greg Knaddison (greggles) [9] of the Drupal Security Team
* Jess (xjm) [10] of the Drupal Security Team
------------------------------------------------------------------------------
Contribution record [11]
[1] https://www.drupal.org/project/next
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/next/releases/2.0.1
[4] https://www.drupal.org/project/next/releases/1.6.4
[5] https://www.drupal.org/u/pookmish
[6] https://www.drupal.org/u/brianperry
[7] https://www.drupal.org/u/rrrob
[8] https://www.drupal.org/u/bramdriesen
[9] https://www.drupal.org/u/greggles
[10] https://www.drupal.org/u/xjm
[11]
https://new.drupal.org/contribution-record?source_link=https%3A//www.drupal…