View online: https://www.drupal.org/sa-contrib-2025-075
Project: COOKiES Consent Management [1] Date: 2025-May-28 Security risk: *Moderately critical* 12 ∕ 25 AC:Complex/A:Admin/CI:Some/II:Some/E:Theoretical/TD:All [2] Vulnerability: Cross Site Scripting
Affected versions: <1.2.15 CVE IDs: CVE-2025-48914 Description: This module provides a format filter, which allows you to "disable" certain HTML elements (e.g. remove their src attribute) specified by the user. These elements will be enabled again, once the COOKiES banner is accepted.
The module doesn't sufficiently check whether to convert "data-src" attributes to "src" when their value might contain malicious content under the scenario, that module specific classes are set on the HTML element.
This vulnerability is mitigated by the fact that the site must have the COOKiES filter submodule enabled and an attacker must have the correct permissions to have a specific HTML element display for all users, and this HTML element needs to have three concise classes set.
Solution: Install the latest version:
* If you use the COOKiES Consent Management module for Drupal 9 or above, upgrade to COOKiES Consent Management 1.2.15 [3]
Reported By: * Pierre Rudloff (prudloff) [4]
Fixed By: * Julian Pustkuchen (anybody) [5] * Joshua Sedler (grevil) [6] * Joachim Feltkamp (jfeltkamp) [7]
Coordinated By: * Juraj Nemec (poker10) [8] of the Drupal Security Team * Cathy Theys (yesct) [9] of the Drupal Security Team
[1] https://www.drupal.org/project/cookies [2] https://www.drupal.org/security-team/risk-levels [3] https://www.drupal.org/project/cookies/releases/1.2.15 [4] https://www.drupal.org/u/prudloff [5] https://www.drupal.org/u/anybody [6] https://www.drupal.org/u/grevil [7] https://www.drupal.org/u/jfeltkamp [8] https://www.drupal.org/u/poker10 [9] https://www.drupal.org/u/yesct