View online: https://www.drupal.org/sa-contrib-2025-117
Project: Mini site [1] Date: 2025-December-03 Security risk: *Moderately critical* 14 ∕ 25 AC:Basic/A:User/CI:Some/II:Some/E:Theoretical/TD:All [2] Vulnerability: Cross-Site Scripting
Affected versions: <3.0.2 CVE IDs: CVE-2025-13979 Description: This module allows uploading a zip file and extracting its content in the public file directory to serve this content from a Drupal website.
These zip files may contain arbitrary HTML or SVG content that could allow cross-site scripting vulnerabilities. While this is an expected feature, the module does not sufficiently restrict this functionality to trusted users with a "restricted access" permission. Users without a restricted permission should not be able to inject arbitrary JavaScript.
This vulnerability is mitigated by the fact that an attacker must have a role with the permission /create [bundle] content/ permission.
Solution: *Two steps are required.* Install the latest version and adjust configuration:
1) If you use Mini site 2.x or 3.x versions, upgrade to the Mini site 3.0.2 [3]. 2) A new /manage minisites/ permission has been added. This new permission will need to be assigned to a trusted role for the user to be able to upload the zip file.
Reported By: * Pierre Rudloff (prudloff) [4] provisional member of the Drupal Security Team
Fixed By: * cb_govcms [5]
Coordinated By: * Greg Knaddison (greggles) [6] of the Drupal Security Team * Juraj Nemec (poker10) [7] of the Drupal Security Team * Pierre Rudloff (prudloff) [8] provisional member of the Drupal Security Team * Jess (xjm) [9] of the Drupal Security Team
------------------------------------------------------------------------------ Contribution record [10]
[1] https://www.drupal.org/project/minisite [2] https://www.drupal.org/security-team/risk-levels [3] https://www.drupal.org/project/minisite/releases/3.0.2 [4] https://www.drupal.org/u/prudloff [5] https://www.drupal.org/u/cb_govcms [6] https://www.drupal.org/u/greggles [7] https://www.drupal.org/u/poker10 [8] https://www.drupal.org/u/prudloff [9] https://www.drupal.org/u/xjm [10] https://new.drupal.org/contribution-record?source_link=https%3A//www.drupal....