Skip to main content

CVE-2025-31696: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Drupal RapiDoc OAS Field Formatter

Medium
VulnerabilityCVE-2025-31696cvecve-2025-31696cwe-79
Published: Mon Mar 31 2025 (03/31/2025, 21:55:01 UTC)
Source: CVE
Vendor/Project: Drupal
Product: RapiDoc OAS Field Formatter

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal RapiDoc OAS Field Formatter allows Cross-Site Scripting (XSS).This issue affects RapiDoc OAS Field Formatter: from 0.0.0 before 1.0.1.

AI-Powered Analysis

AILast updated: 06/25/2025, 00:50:39 UTC

Technical Analysis

CVE-2025-31696 is a Cross-Site Scripting (XSS) vulnerability classified under CWE-79, affecting the Drupal RapiDoc OAS Field Formatter module versions prior to 1.0.1, specifically from version 0.0.0 up to but not including 1.0.1. The vulnerability arises due to improper neutralization of input during web page generation, allowing malicious input to be injected and executed within the context of a user's browser. This flaw enables attackers to craft specially crafted payloads that, when rendered by the vulnerable Drupal module, execute arbitrary JavaScript code in the victim's browser. The CVSS v3.1 base score is 6.1 (medium severity), with the vector AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N indicating that the attack can be launched remotely over the network without privileges, requires low attack complexity, no privileges, but does require user interaction (e.g., clicking a malicious link). The scope is changed (S:C), meaning the vulnerability affects resources beyond the vulnerable component. The impact affects confidentiality and integrity to a limited extent, with no impact on availability. No known exploits are currently in the wild, and no official patches have been linked yet. The vulnerability specifically targets the RapiDoc OAS Field Formatter, a Drupal module used to render OpenAPI Specification (OAS) documentation within Drupal sites, which is often used by organizations to document and expose APIs. Improper input sanitization during the rendering process allows injection of malicious scripts, which can lead to session hijacking, defacement, or redirection attacks when users interact with the affected pages.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to web applications that utilize the Drupal RapiDoc OAS Field Formatter module to display API documentation. Exploitation could lead to theft of session tokens, user impersonation, or unauthorized actions performed in the context of the victim user. This is particularly concerning for organizations that expose sensitive API documentation internally or externally, such as government agencies, financial institutions, healthcare providers, and technology companies. The XSS vulnerability could be leveraged to target privileged users or administrators, potentially leading to further compromise of internal systems. Additionally, the scope change in the CVSS vector suggests that the vulnerability could affect multiple components or user sessions beyond the immediate vulnerable module, increasing the potential attack surface. Given the reliance on Drupal in many European public sector and enterprise environments, the impact could extend to data confidentiality breaches and erosion of trust in affected services. However, since exploitation requires user interaction and the impact on availability is none, the threat is less severe than vulnerabilities allowing remote code execution or denial of service. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the need for prompt remediation.

Mitigation Recommendations

1. Immediate upgrade: Organizations should promptly update the RapiDoc OAS Field Formatter module to version 1.0.1 or later once it becomes available, as this will contain the necessary input sanitization fixes. 2. Input validation and output encoding: Until patches are applied, implement additional server-side input validation and strict output encoding policies for any user-supplied data rendered by the module. 3. Content Security Policy (CSP): Deploy a robust CSP header to restrict the execution of unauthorized scripts and mitigate the impact of XSS attacks. 4. User awareness: Educate users, especially administrators and developers, about the risks of clicking untrusted links or interacting with suspicious content related to API documentation. 5. Access controls: Restrict access to API documentation pages rendered by the RapiDoc module to trusted users only, using authentication and authorization mechanisms. 6. Web Application Firewall (WAF): Configure WAF rules to detect and block common XSS payloads targeting Drupal modules, including RapiDoc. 7. Monitoring and logging: Enable detailed logging of web requests and monitor for unusual activity or attempted exploitation patterns targeting the vulnerable module. 8. Review customizations: Audit any custom code or integrations with the RapiDoc module to ensure they do not introduce additional injection vectors.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
drupal
Date Reserved
2025-03-31T21:30:25.065Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983cc4522896dcbeec6e

Added to database: 5/21/2025, 9:09:16 AM

Last enriched: 6/25/2025, 12:50:39 AM

Last updated: 8/10/2025, 4:05:44 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats