View online: https://www.drupal.org/sa-contrib-2026-032
Project: Orejime [1] Date: 2026-April-08 Security risk: *Moderately critical* 13 ∕ 25 AC:Basic/A:User/CI:Some/II:Some/E:Theoretical/TD:Default [2] Vulnerability: Cross-site scripting
Affected versions: <2.0.16 Description: The IframeConsent element writes HTML attributes without escaping their value.
This module has a XSS vulnerability. If an attacker is able to write an tag, they may be able to insert arbitrary JavaScript.
This vulnerability is mitigated by the fact that a text format that allows iframe-consent HTML tags with alt attributes in the necessary option (/Enable JS Iframe consent/) must be enabled, and an attacker must have a role allowing the creation or modification of content in a field with text the format.
Solution: Install the latest version:
* If you use the 2.x branch of Orejime, upgrade to Orejime 2.0.16 [3].
Reported By: * Pierre Rudloff (prudloff) [4] of the Drupal Security Team
Fixed By: * Fabien Gutknecht (fabsgugu) [5] * Pierre Rudloff (prudloff) [6] of the Drupal Security Team
Coordinated By: * Juraj Nemec (poker10) [7] of the Drupal Security Team * Pierre Rudloff (prudloff) [8] of the Drupal Security Team * Jess (xjm) [9] of the Drupal Security Team
------------------------------------------------------------------------------ Contribution record [10]
[1] https://www.drupal.org/project/orejime [2] https://www.drupal.org/security-team/risk-levels [3] https://www.drupal.org/project/orejime/releases/2.0.16 [4] https://www.drupal.org/u/prudloff [5] https://www.drupal.org/u/fabsgugu [6] https://www.drupal.org/u/prudloff [7] https://www.drupal.org/u/poker10 [8] https://www.drupal.org/u/prudloff [9] https://www.drupal.org/u/xjm [10] https://new.drupal.org/contribution-record?source_link=https%3A//www.drupal....