View online: https://www.drupal.org/sa-contrib-2021-031
Project: Client-side Hierarchical Select [1] Date: 2021-September-22 Security risk: *Moderately critical* 13∕25 AC:Basic/A:User/CI:Some/II:Some/E:Theoretical/TD:Default [2] Vulnerability: Cross-site scripting
Description: The module provides a field widget for selecting taxonomy terms in a hierarchical fashion.
The module doesn't sanitize user input in certain cases, leading to a possible Cross-Site-Scripting (XSS) vulnerability.
This vulnerability is mitigated by the fact that an attacker must have a role with permission to create or edit taxonomy terms to which the widget may apply.
Solution: Install the latest version:
* If you use the cshs module for Drupal 8 or 9, upgrade to Client-side Hierarchical Select 8.x-3.5 [3].
Reported By: * Patrick Fey [4]
Fixed By: * Sergii Bondarenko [5] * Patrick Fey [6]
Coordinated By: * Damien McKenna [7] of the Drupal Security Team * Greg Knaddison [8] of the Drupal Security Team
[1] https://www.drupal.org/project/cshs [2] https://www.drupal.org/security-team/risk-levels [3] https://www.drupal.org/project/cshs/releases/8.x-3.5 [4] https://www.drupal.org/user/998680 [5] https://www.drupal.org/user/2802285 [6] https://www.drupal.org/user/998680 [7] https://www.drupal.org/u/damienmckenna [8] https://www.drupal.org/u/greggles