View online: https://www.drupal.org/sa-contrib-2025-116
Project: Simple multi step form [1] Date: 2025-November-05 Security risk: *Moderately critical* 13 ∕ 25 AC:Basic/A:Admin/CI:Some/II:Some/E:Theoretical/TD:All [2] Vulnerability: Cross-site Scripting
Affected versions: <2.0.0 CVE IDs: CVE-2025-12761 Description: This module provides the ability to convert any entity form into a simple multi-step form.
The module doesn’t sufficiently filter certain user-provided text leading to a cross-site scripting (XSS) vulnerability.
This vulnerability is mitigated by the fact that an attacker must have a role with the permission “administer node form display”.
Solution: Install the latest version:
* If you use the Simple multi step form module for Drupal, upgrade to a release from the 2.x branch [3], as the 8.x-1.x branch is now unsupported
Reported By: * Ide Braakman (idebr) [4]
Fixed By: * Diosbel Mezquía (dmezquia) [5] * Ide Braakman (idebr) [6] * Vitaliy Bogomazyuk (vitaliyb98) [7]
Coordinated By: * Greg Knaddison (greggles) [8] of the Drupal Security Team * Ivo Van Geertruyen (mr.baileys) [9] of the Drupal Security Team * Juraj Nemec (poker10) [10] of the Drupal Security Team
------------------------------------------------------------------------------ Contribution record [11]
[1] https://www.drupal.org/project/simple_multistep [2] https://www.drupal.org/security-team/risk-levels [3] https://www.drupal.org/project/simple_multistep/releases/2.1.0 [4] https://www.drupal.org/u/idebr [5] https://www.drupal.org/u/dmezquia [6] https://www.drupal.org/u/idebr [7] https://www.drupal.org/u/vitaliyb98 [8] https://www.drupal.org/u/greggles [9] https://www.drupal.org/u/mrbaileys [10] https://www.drupal.org/u/poker10 [11] https://new.drupal.org/contribution-record?source_link=https%3A//www.drupal....