[Security-news] Simple XML sitemap - Moderately critical - Cross-site Scripting - SA-CONTRIB-2025-083

security-news at drupal.org security-news at drupal.org
Wed Jun 25 18:42:38 UTC 2025


View online: https://www.drupal.org/sa-contrib-2025-083

Project: Simple XML sitemap [1]
Date: 2025-June-25
Security risk: *Moderately critical* 13 ∕ 25
AC:Basic/A:Admin/CI:Some/II:Some/E:Theoretical/TD:All [2]
Vulnerability: Cross-site Scripting

Affected versions: < 4.2.2
CVE IDs: CVE-2025-6676
Description: 
Simple XML sitemap [3] is a SEO module that allows creating various XML
sitemaps of the site's content and submitting them to search engines.
The module doesn't sufficiently sanitize input when administering it, which
leads to a Cross-site scripting (XSS) attack vector.
This vulnerability is mitigated by the fact that an attacker must have the
administrative permission 'administer sitemap settings'.

Solution: 
This vulnerability requires 2 steps:

  * If you use simple_sitemap upgrade to at least 4.2.2 [4] or a later,
    supported version.
  * For all versions, ensure your permissions are assigned to appropriate
    roles and users with "administer sitemap settings" permission are trusted.

Reported By: 
  * Nick Vanpraet (grayle) [5]

Fixed By: 
  * David Rothstein (David_Rothstein) [6]
  * Pawel Ginalski (gbyte) [7]

Coordinated By: 
  * Greg Knaddison (greggles) [8] of the Drupal Security Team
  * Michael Hess (mlhess) [9] of the Drupal Security Team
  * Juraj Nemec (poker10) [10] of the Drupal Security Team


[1] https://www.drupal.org/project/simple_sitemap
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/simple_sitemap
[4] https://www.drupal.org/project/simple_sitemap/releases/4.2.2
[5] https://www.drupal.org/u/grayle
[6] https://www.drupal.org/u/david_rothstein
[7] https://www.drupal.org/u/gbyte
[8] https://www.drupal.org/u/greggles
[9] https://www.drupal.org/u/mlhess
[10] https://www.drupal.org/u/poker10



More information about the Security-news mailing list