View online: https://www.drupal.org/sa-contrib-2025-011
Project: Google Tag [1] Date: 2025-January-29 Security risk: *Moderately critical* 13 ∕ 25 AC:Basic/A:Admin/CI:Some/II:Some/E:Theoretical/TD:All [2] Vulnerability: Cross Site Scripting
Affected versions: <1.8.0 || >=2.0.0 <2.0.8 Description: This module enables you to integrate the site with the Google Tag Manager (GTM) application.
The module doesn't have the "restrict access" flag on the "administer google_tag_container" permission. A user with this permission can load a GTM container that completely changes the page or inserts malicious JS, resulting in a cross site scripting vulnerability.
This vulnerability is mitigated by the fact that an attacker must have a role with the aforementioned permission.
Solution: Install the latest version:
* If you use the Google Tag module 8.x, upgrade to Google Tag 8.x-1.8 [3] * If you use the Google Tag module 2.0.x, upgrade to Google Tag 2.0.8 [4]
Reported By: * Pierre Rudloff [5]
Fixed By: * Jakob P [6] * Jim Berry [7]
Coordinated By: * Greg Knaddison [8] of the Drupal Security Team * Juraj Nemec [9] of the Drupal Security Team
[1] https://www.drupal.org/project/google_tag [2] https://www.drupal.org/security-team/risk-levels [3] https://www.drupal.org/project/google_tag/releases/8.x-1.8 [4] https://www.drupal.org/project/google_tag/releases/2.0.8 [5] https://www.drupal.org/user/3611858 [6] https://www.drupal.org/user/45640 [7] https://www.drupal.org/user/240748 [8] https://www.drupal.org/user/36762 [9] https://www.drupal.org/user/272316