View online: https://www.drupal.org/sa-contrib-2020-014
Project: Webform [1] Date: 2020-May-06 Security risk: *Moderately critical* 13∕25 AC:Basic/A:Admin/CI:Some/II:Some/E:Theoretical/TD:All [2] Vulnerability: Cross site scripting
Description: This module enables you to build forms and surveys in Drupal.
The module doesn't sufficiently filter user input under in the scenario when a webform is edited, namely the message related to character min/max counter does not undergo sufficient filtering and thus allows execution of JavaScript code through it.
This vulnerability is mitigated by the fact that an attacker must have a role with the permission "Edit own webform" (or "Edit any webform").
Solution: Install the latest version:
* If you use the Webform module for Drupal 8, upgrade to Webform 8.x-5.11 [3]
Also see the Webform [4] project page.
Reported By: * Krzysztof Domański [5]
Fixed By: * Krzysztof Domański [6] * Lee Rowlands [7] of the Drupal Security Team * Jacob Rockowitz [8] * bucefal91 [9]
Coordinated By: * Greg Knaddison [10] of the Drupal Security Team
[1] https://www.drupal.org/project/webform [2] https://www.drupal.org/security-team/risk-levels [3] https://www.drupal.org/project/webform/releases/8.x-5.11 [4] https://www.drupal.org/project/webform [5] https://www.drupal.org/user/3572982 [6] https://www.drupal.org/user/3572982 [7] https://www.drupal.org/user/395439 [8] https://www.drupal.org/user/371407 [9] https://www.drupal.org/user/504128 [10] https://www.drupal.org/user/36762