[Security-news] Toc.js - Moderately critical - Cross-site Scripting - SA-CONTRIB-2025-077

security-news at drupal.org security-news at drupal.org
Wed Jun 25 18:41:07 UTC 2025


View online: https://www.drupal.org/sa-contrib-2025-077

Project: Toc.js [1]
Date: 2025-June-25
Security risk: *Moderately critical* 12 ∕ 25
AC:Basic/A:User/CI:Some/II:Some/E:Theoretical/TD:Uncommon [2]
Vulnerability: Cross-site Scripting

Affected versions: <3.2.1
CVE IDs: CVE-2025-48923
Description: 
This module enables you to generate Table of content of your pages given a
configuration.

The module doesn't sufficiently sanitise data attributes allowing persistent
Cross-site Scripting (XSS) attacks.

This vulnerability is mitigated by the fact that an attacker must have a role
with permission to enter HTML tags containing specific data attributes using
other modules.

Solution: 
Install the latest version:

  * If you use the Toc JS module, upgrade to Toc Js 3.2.1 [3]

Reported By: 
  * Pierre Rudloff (prudloff) [4] provisional member of the Drupal Security
    Team

Fixed By: 
  * Flocon de toile  (flocondetoile) [5]
  * Frank Mably (mably) [6]
  * Pierre Rudloff (prudloff) [7] provisional member of the Drupal Security
    Team

Coordinated By: 
  * Greg Knaddison (greggles) [8] of the Drupal Security Team
  * Juraj Nemec (poker10) [9] of the Drupal Security Team
  * Pierre Rudloff (prudloff) [10] provisional member of the Drupal Security
    Team


[1] https://www.drupal.org/project/toc_js
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/toc_js/releases/3.2.1
[4] https://www.drupal.org/u/prudloff
[5] https://www.drupal.org/u/flocondetoile
[6] https://www.drupal.org/u/mably
[7] https://www.drupal.org/u/prudloff
[8] https://www.drupal.org/u/greggles
[9] https://www.drupal.org/u/poker10
[10] https://www.drupal.org/u/prudloff



More information about the Security-news mailing list