View online: https://www.drupal.org/sa-contrib-2025-077
Project: Toc.js [1] Date: 2025-June-25 Security risk: *Moderately critical* 12 ∕ 25 AC:Basic/A:User/CI:Some/II:Some/E:Theoretical/TD:Uncommon [2] Vulnerability: Cross-site Scripting
Affected versions: <3.2.1 CVE IDs: CVE-2025-48923 Description: This module enables you to generate Table of content of your pages given a configuration.
The module doesn't sufficiently sanitise data attributes allowing persistent Cross-site Scripting (XSS) attacks.
This vulnerability is mitigated by the fact that an attacker must have a role with permission to enter HTML tags containing specific data attributes using other modules.
Solution: Install the latest version:
* If you use the Toc JS module, upgrade to Toc Js 3.2.1 [3]
Reported By: * Pierre Rudloff (prudloff) [4] provisional member of the Drupal Security Team
Fixed By: * Flocon de toile (flocondetoile) [5] * Frank Mably (mably) [6] * Pierre Rudloff (prudloff) [7] provisional member of the Drupal Security Team
Coordinated By: * Greg Knaddison (greggles) [8] of the Drupal Security Team * Juraj Nemec (poker10) [9] of the Drupal Security Team * Pierre Rudloff (prudloff) [10] provisional member of the Drupal Security Team
[1] https://www.drupal.org/project/toc_js [2] https://www.drupal.org/security-team/risk-levels [3] https://www.drupal.org/project/toc_js/releases/3.2.1 [4] https://www.drupal.org/u/prudloff [5] https://www.drupal.org/u/flocondetoile [6] https://www.drupal.org/u/mably [7] https://www.drupal.org/u/prudloff [8] https://www.drupal.org/u/greggles [9] https://www.drupal.org/u/poker10 [10] https://www.drupal.org/u/prudloff