View online: https://www.drupal.org/sa-contrib-2026-009
Project: Quick Edit [1] Date: 2026-February-11 Security risk: *Moderately critical* 14 ∕ 25 AC:Basic/A:User/CI:Some/II:Some/E:Theoretical/TD:All [2] Vulnerability: Cross-site Scripting
Affected versions: <1.0.5 || >=2.0.0 <2.0.1 CVE IDs: CVE-2026-2348 Description: This module allows content to be edited in-place.
The module doesn't sufficiently sanitize certain image-related values during the editing process leading to a persistent Cross-site Scripting (XSS) vulnerability.
This vulnerability is mitigated by the fact that an attacker must have permission to create or edit an affected field.
Solution: Install the latest version:
* If you use the QuickEdit module for Drupal 9, upgrade to 2.0.1 [3] or 1.0.5 [4]
Reported By: * Drew Webber (mcdruid) [5] of the Drupal Security Team
Fixed By: * Derek Wright (dww) [6] * Vladimir Roudakov (vladimiraus) [7]
Coordinated By: * Greg Knaddison (greggles) [8] of the Drupal Security Team * Drew Webber (mcdruid) [9] of the Drupal Security Team
------------------------------------------------------------------------------ Contribution record [10]
[1] https://www.drupal.org/project/quickedit [2] https://www.drupal.org/security-team/risk-levels [3] https://www.drupal.org/project/quickedit/releases/2.0.1 [4] https://www.drupal.org/project/quickedit/releases/1.0.5 [5] https://www.drupal.org/u/mcdruid [6] https://www.drupal.org/u/dww [7] https://www.drupal.org/u/vladimiraus [8] https://www.drupal.org/u/greggles [9] https://www.drupal.org/u/mcdruid [10] https://new.drupal.org/contribution-record?source_link=https%3A//www.drupal....