Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13983: CWE-79 Improper Neutralization of Input During Web Page Generation ("Cross-site Scripting") in Drupal Tagify

0
Medium
VulnerabilityCVE-2025-13983cvecve-2025-13983cwe-79
Published: Wed Jan 28 2026 (01/28/2026, 20:02:09 UTC)
Source: CVE Database V5
Vendor/Project: Drupal
Product: Tagify

Description

CVE-2025-13983 is a medium severity Cross-Site Scripting (XSS) vulnerability in the Drupal Tagify module versions before 1. 2. 44. It arises from improper neutralization of input during web page generation, allowing attackers with low privileges and requiring user interaction to inject malicious scripts. The vulnerability impacts confidentiality and integrity by enabling script execution in the context of authenticated users, potentially leading to session hijacking or data manipulation. No known exploits are currently reported in the wild. European organizations using Drupal with the vulnerable Tagify versions should prioritize patching to mitigate risks. The vulnerability has a CVSS score of 5. 4, reflecting its moderate impact and exploitability. Countries with significant Drupal adoption and critical web infrastructure, such as Germany, France, and the UK, are most likely to be affected.

AI-Powered Analysis

AILast updated: 02/05/2026, 08:52:59 UTC

Technical Analysis

CVE-2025-13983 is a Cross-Site Scripting (XSS) vulnerability classified under CWE-79, affecting the Drupal Tagify module versions prior to 1.2.44. The vulnerability stems from improper neutralization of input during web page generation, which allows an attacker to inject malicious JavaScript code into web pages viewed by other users. Exploitation requires the attacker to have low privileges (PR:L) and user interaction (UI:R), such as tricking a user into clicking a crafted link or submitting malicious input that is then rendered unsafely. The vulnerability impacts the confidentiality and integrity of user data by enabling script execution in the context of the victim's browser, potentially leading to session hijacking, unauthorized actions, or data theft. The CVSS v3.1 score of 5.4 reflects a medium severity, with network attack vector (AV:N), low attack complexity (AC:L), and scope change (S:C), indicating that the vulnerability can affect resources beyond the initially vulnerable component. No known exploits have been reported in the wild, but the presence of this vulnerability in widely used Drupal installations poses a risk if left unpatched. The Tagify module is commonly used to enhance user input fields with tagging functionality, making it a frequent component in content management systems built on Drupal. The vulnerability was reserved in December 2025 and published in January 2026, indicating recent discovery and disclosure. The lack of available patches at the time of reporting necessitates urgent attention from administrators to monitor updates and apply fixes promptly.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to web applications built on Drupal that utilize the Tagify module. Successful exploitation could lead to unauthorized script execution in users’ browsers, compromising session tokens, user credentials, or enabling actions on behalf of authenticated users. This can result in data breaches, defacement, or further lateral attacks within the organization’s network. Given Drupal's popularity among government, educational, and commercial websites in Europe, the impact could extend to sensitive public sector data and critical infrastructure portals. The vulnerability’s requirement for user interaction somewhat limits automated widespread exploitation but does not eliminate targeted phishing or social engineering attacks. The scope change in the CVSS vector suggests that the vulnerability could affect multiple components or users beyond the initial injection point, increasing potential damage. Organizations handling personal data under GDPR must consider the regulatory implications of such breaches, including notification requirements and potential fines. The absence of known exploits provides a window for proactive mitigation, but the medium severity rating underscores the need for timely patching and monitoring.

Mitigation Recommendations

1. Immediately upgrade the Drupal Tagify module to version 1.2.44 or later once available to address the vulnerability. 2. Implement strict input validation and sanitization on all user-supplied data, especially in fields enhanced by Tagify, to prevent injection of malicious scripts. 3. Deploy Content Security Policies (CSP) to restrict the execution of unauthorized scripts and reduce the impact of potential XSS attacks. 4. Educate users and administrators about the risks of phishing and social engineering attacks that could trigger this vulnerability, emphasizing cautious interaction with unexpected links or inputs. 5. Monitor web server and application logs for unusual activity or error messages that may indicate attempted exploitation. 6. Use web application firewalls (WAFs) with updated rule sets to detect and block common XSS payloads targeting Drupal applications. 7. Conduct regular security assessments and penetration testing focusing on input handling and client-side script execution. 8. Ensure that session management mechanisms are robust, including the use of HttpOnly and Secure flags on cookies to mitigate session hijacking risks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
drupal
Date Reserved
2025-12-03T17:04:24.229Z
Cvss Version
null
State
PUBLISHED

Threat ID: 697a6c254623b1157cec1708

Added to database: 1/28/2026, 8:05:57 PM

Last enriched: 2/5/2026, 8:52:59 AM

Last updated: 2/8/2026, 4:39:56 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats