View online: https://www.drupal.org/sa-core-2024-003
Project: Drupal core [1] Date: 2024-November-20 Security risk: *Moderately critical* 13 ∕ 25 AC:Basic/A:User/CI:Some/II:Some/E:Theoretical/TD:Default [2] Vulnerability: Cross Site Scripting
Affected versions: >= 8.8.0 < 10.2.11 || >= 10.3.0 < 10.3.9 || >= 11.0.0 < 11.0.8 Description: Drupal uses JavaScript to render status messages in some cases and configurations. In certain situations, the status messages are not adequately sanitized.
Solution: Install the latest version:
* If you are using Drupal 10.2, update to Drupal 10.2.11. [3] * If you are using Drupal 10.3, update to Drupal 10.3.9. [4] * If you are using Drupal 11.0, update to Drupal 11.0.8. [5]
All versions of Drupal 10 prior to 10.2 are end-of-life and do not receive security coverage. (Drupal 8 [6] and Drupal 9 [7] have both reached end-of-life.)
Reported By: * Jay Beaton [8]
Fixed By: * Lee Rowlands [9] of the Drupal Security Team * catch [10] of the Drupal Security Team * Mingsong [11] * Juraj Nemec [12] of the Drupal Security Team * Dave Long [13] of the Drupal Security Team * Benji Fisher [14] of the Drupal Security Team
Coordinated By: * Juraj Nemec [15] of the Drupal Security Team * Greg Knaddison [16] of the Drupal Security Team
[1] https://www.drupal.org/project/drupal [2] https://www.drupal.org/security-team/risk-levels [3] https://www.drupal.org/project/drupal/releases/10.2.11 [4] https://www.drupal.org/project/drupal/releases/10.3.9 [5] https://www.drupal.org/project/drupal/releases/11.0.8 [6] https://www.drupal.org/psa-2021-06-29 [7] https://www.drupal.org/psa-2023-11-01 [8] https://www.drupal.org/user/352123 [9] https://www.drupal.org/user/395439 [10] https://www.drupal.org/user/35733 [11] https://www.drupal.org/user/2986445 [12] https://www.drupal.org/user/272316 [13] https://www.drupal.org/user/246492 [14] https://www.drupal.org/user/683300 [15] https://www.drupal.org/user/272316 [16] https://www.drupal.org/user/36762