CVE-2025-47703: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Drupal COOKiES Consent Management
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal COOKiES Consent Management allows Cross-Site Scripting (XSS).This issue affects COOKiES Consent Management: from 0.0.0 before 1.2.14.
AI Analysis
Technical Summary
CVE-2025-47703 is a Cross-Site Scripting (XSS) vulnerability classified under CWE-79, affecting the Drupal COOKiES Consent Management module versions prior to 1.2.14. The vulnerability arises due to improper neutralization of input during web page generation, allowing malicious actors to inject and execute arbitrary scripts in the context of a victim's browser. Specifically, this flaw exists in the way the module processes user input or parameters related to cookie consent management, failing to adequately sanitize or encode this data before rendering it on web pages. The vulnerability has a CVSS 3.1 base score of 6.1, indicating a medium severity level. The vector string (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) shows that the attack can be launched remotely over the network without privileges, requires low attack complexity, no privileges, but does require user interaction (e.g., the victim must click a crafted link). The scope is changed (S:C), meaning the vulnerability affects resources beyond the vulnerable component, and the impact is limited to partial confidentiality and integrity loss, with no impact on availability. No known exploits are currently reported in the wild. The vulnerability was published on May 14, 2025, and affects versions from 0.0.0 up to but not including 1.2.14. Drupal COOKiES Consent Management is a module used to manage cookie consent banners and compliance with privacy regulations such as GDPR. The vulnerability could be exploited to steal session tokens, perform actions on behalf of users, or manipulate displayed content, potentially leading to phishing or other social engineering attacks within affected Drupal sites.
Potential Impact
For European organizations, this vulnerability poses a significant risk given the widespread use of Drupal as a content management system and the legal importance of cookie consent management under GDPR. Exploitation could lead to unauthorized disclosure of user data (confidentiality impact) and manipulation of web content (integrity impact), undermining user trust and potentially causing regulatory non-compliance issues. Attackers could leverage XSS to hijack user sessions, steal cookies, or conduct targeted phishing attacks, which is particularly concerning for organizations handling sensitive personal data. Since the vulnerability requires user interaction, phishing or social engineering campaigns could be used to trigger the exploit. The scope change indicates that the vulnerability could affect multiple components or user sessions beyond the initial point of compromise. This could impact sectors such as finance, healthcare, government, and e-commerce, where Drupal is commonly deployed and where cookie consent management is critical for compliance. Additionally, reputational damage and potential fines under GDPR could be severe if personal data is compromised due to this vulnerability.
Mitigation Recommendations
European organizations should prioritize updating the Drupal COOKiES Consent Management module to version 1.2.14 or later, where the vulnerability is patched. Until the update is applied, organizations should implement strict Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of XSS attacks. Web Application Firewalls (WAFs) should be configured to detect and block common XSS payloads targeting the consent management endpoints. Organizations should audit their Drupal sites to identify usage of the vulnerable module and monitor logs for suspicious activity or attempted exploitation. User awareness training should emphasize caution with unsolicited links or unexpected prompts related to cookie consent. Additionally, consider implementing input validation and output encoding at the application level for any customizations interacting with the consent management module. Regular vulnerability scanning and penetration testing focused on XSS vectors in Drupal environments will help detect residual or related issues. Finally, ensure incident response plans include procedures for handling XSS incidents and potential data breaches stemming from such vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden, Poland, Ireland
CVE-2025-47703: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Drupal COOKiES Consent Management
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal COOKiES Consent Management allows Cross-Site Scripting (XSS).This issue affects COOKiES Consent Management: from 0.0.0 before 1.2.14.
AI-Powered Analysis
Technical Analysis
CVE-2025-47703 is a Cross-Site Scripting (XSS) vulnerability classified under CWE-79, affecting the Drupal COOKiES Consent Management module versions prior to 1.2.14. The vulnerability arises due to improper neutralization of input during web page generation, allowing malicious actors to inject and execute arbitrary scripts in the context of a victim's browser. Specifically, this flaw exists in the way the module processes user input or parameters related to cookie consent management, failing to adequately sanitize or encode this data before rendering it on web pages. The vulnerability has a CVSS 3.1 base score of 6.1, indicating a medium severity level. The vector string (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) shows that the attack can be launched remotely over the network without privileges, requires low attack complexity, no privileges, but does require user interaction (e.g., the victim must click a crafted link). The scope is changed (S:C), meaning the vulnerability affects resources beyond the vulnerable component, and the impact is limited to partial confidentiality and integrity loss, with no impact on availability. No known exploits are currently reported in the wild. The vulnerability was published on May 14, 2025, and affects versions from 0.0.0 up to but not including 1.2.14. Drupal COOKiES Consent Management is a module used to manage cookie consent banners and compliance with privacy regulations such as GDPR. The vulnerability could be exploited to steal session tokens, perform actions on behalf of users, or manipulate displayed content, potentially leading to phishing or other social engineering attacks within affected Drupal sites.
Potential Impact
For European organizations, this vulnerability poses a significant risk given the widespread use of Drupal as a content management system and the legal importance of cookie consent management under GDPR. Exploitation could lead to unauthorized disclosure of user data (confidentiality impact) and manipulation of web content (integrity impact), undermining user trust and potentially causing regulatory non-compliance issues. Attackers could leverage XSS to hijack user sessions, steal cookies, or conduct targeted phishing attacks, which is particularly concerning for organizations handling sensitive personal data. Since the vulnerability requires user interaction, phishing or social engineering campaigns could be used to trigger the exploit. The scope change indicates that the vulnerability could affect multiple components or user sessions beyond the initial point of compromise. This could impact sectors such as finance, healthcare, government, and e-commerce, where Drupal is commonly deployed and where cookie consent management is critical for compliance. Additionally, reputational damage and potential fines under GDPR could be severe if personal data is compromised due to this vulnerability.
Mitigation Recommendations
European organizations should prioritize updating the Drupal COOKiES Consent Management module to version 1.2.14 or later, where the vulnerability is patched. Until the update is applied, organizations should implement strict Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of XSS attacks. Web Application Firewalls (WAFs) should be configured to detect and block common XSS payloads targeting the consent management endpoints. Organizations should audit their Drupal sites to identify usage of the vulnerable module and monitor logs for suspicious activity or attempted exploitation. User awareness training should emphasize caution with unsolicited links or unexpected prompts related to cookie consent. Additionally, consider implementing input validation and output encoding at the application level for any customizations interacting with the consent management module. Regular vulnerability scanning and penetration testing focused on XSS vectors in Drupal environments will help detect residual or related issues. Finally, ensure incident response plans include procedures for handling XSS incidents and potential data breaches stemming from such vulnerabilities.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- drupal
- Date Reserved
- 2025-05-07T16:02:44.264Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f71484d88663aeae5e
Added to database: 5/20/2025, 6:59:03 PM
Last enriched: 7/11/2025, 1:04:40 PM
Last updated: 8/17/2025, 9:41:19 AM
Views: 15
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.