[Security-news] Toc.js - Moderately critical - Cross-site Scripting - SA-CONTRIB-2025-077
security-news at drupal.org
security-news at drupal.org
Wed Jun 25 18:41:07 UTC 2025
View online: https://www.drupal.org/sa-contrib-2025-077
Project: Toc.js [1]
Date: 2025-June-25
Security risk: *Moderately critical* 12 ∕ 25
AC:Basic/A:User/CI:Some/II:Some/E:Theoretical/TD:Uncommon [2]
Vulnerability: Cross-site Scripting
Affected versions: <3.2.1
CVE IDs: CVE-2025-48923
Description:
This module enables you to generate Table of content of your pages given a
configuration.
The module doesn't sufficiently sanitise data attributes allowing persistent
Cross-site Scripting (XSS) attacks.
This vulnerability is mitigated by the fact that an attacker must have a role
with permission to enter HTML tags containing specific data attributes using
other modules.
Solution:
Install the latest version:
* If you use the Toc JS module, upgrade to Toc Js 3.2.1 [3]
Reported By:
* Pierre Rudloff (prudloff) [4] provisional member of the Drupal Security
Team
Fixed By:
* Flocon de toile (flocondetoile) [5]
* Frank Mably (mably) [6]
* Pierre Rudloff (prudloff) [7] provisional member of the Drupal Security
Team
Coordinated By:
* Greg Knaddison (greggles) [8] of the Drupal Security Team
* Juraj Nemec (poker10) [9] of the Drupal Security Team
* Pierre Rudloff (prudloff) [10] provisional member of the Drupal Security
Team
[1] https://www.drupal.org/project/toc_js
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/toc_js/releases/3.2.1
[4] https://www.drupal.org/u/prudloff
[5] https://www.drupal.org/u/flocondetoile
[6] https://www.drupal.org/u/mably
[7] https://www.drupal.org/u/prudloff
[8] https://www.drupal.org/u/greggles
[9] https://www.drupal.org/u/poker10
[10] https://www.drupal.org/u/prudloff
More information about the Security-news
mailing list