Skip to main content

CVE-2025-47703: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Drupal COOKiES Consent Management

Medium
VulnerabilityCVE-2025-47703cvecve-2025-47703cwe-79
Published: Wed May 14 2025 (05/14/2025, 17:01:49 UTC)
Source: CVE
Vendor/Project: Drupal
Product: COOKiES Consent Management

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal COOKiES Consent Management allows Cross-Site Scripting (XSS).This issue affects COOKiES Consent Management: from 0.0.0 before 1.2.14.

AI-Powered Analysis

AILast updated: 07/11/2025, 13:04:40 UTC

Technical Analysis

CVE-2025-47703 is a Cross-Site Scripting (XSS) vulnerability classified under CWE-79, affecting the Drupal COOKiES Consent Management module versions prior to 1.2.14. The vulnerability arises due to improper neutralization of input during web page generation, allowing malicious actors to inject and execute arbitrary scripts in the context of a victim's browser. Specifically, this flaw exists in the way the module processes user input or parameters related to cookie consent management, failing to adequately sanitize or encode this data before rendering it on web pages. The vulnerability has a CVSS 3.1 base score of 6.1, indicating a medium severity level. The vector string (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) shows that the attack can be launched remotely over the network without privileges, requires low attack complexity, no privileges, but does require user interaction (e.g., the victim must click a crafted link). The scope is changed (S:C), meaning the vulnerability affects resources beyond the vulnerable component, and the impact is limited to partial confidentiality and integrity loss, with no impact on availability. No known exploits are currently reported in the wild. The vulnerability was published on May 14, 2025, and affects versions from 0.0.0 up to but not including 1.2.14. Drupal COOKiES Consent Management is a module used to manage cookie consent banners and compliance with privacy regulations such as GDPR. The vulnerability could be exploited to steal session tokens, perform actions on behalf of users, or manipulate displayed content, potentially leading to phishing or other social engineering attacks within affected Drupal sites.

Potential Impact

For European organizations, this vulnerability poses a significant risk given the widespread use of Drupal as a content management system and the legal importance of cookie consent management under GDPR. Exploitation could lead to unauthorized disclosure of user data (confidentiality impact) and manipulation of web content (integrity impact), undermining user trust and potentially causing regulatory non-compliance issues. Attackers could leverage XSS to hijack user sessions, steal cookies, or conduct targeted phishing attacks, which is particularly concerning for organizations handling sensitive personal data. Since the vulnerability requires user interaction, phishing or social engineering campaigns could be used to trigger the exploit. The scope change indicates that the vulnerability could affect multiple components or user sessions beyond the initial point of compromise. This could impact sectors such as finance, healthcare, government, and e-commerce, where Drupal is commonly deployed and where cookie consent management is critical for compliance. Additionally, reputational damage and potential fines under GDPR could be severe if personal data is compromised due to this vulnerability.

Mitigation Recommendations

European organizations should prioritize updating the Drupal COOKiES Consent Management module to version 1.2.14 or later, where the vulnerability is patched. Until the update is applied, organizations should implement strict Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of XSS attacks. Web Application Firewalls (WAFs) should be configured to detect and block common XSS payloads targeting the consent management endpoints. Organizations should audit their Drupal sites to identify usage of the vulnerable module and monitor logs for suspicious activity or attempted exploitation. User awareness training should emphasize caution with unsolicited links or unexpected prompts related to cookie consent. Additionally, consider implementing input validation and output encoding at the application level for any customizations interacting with the consent management module. Regular vulnerability scanning and penetration testing focused on XSS vectors in Drupal environments will help detect residual or related issues. Finally, ensure incident response plans include procedures for handling XSS incidents and potential data breaches stemming from such vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
drupal
Date Reserved
2025-05-07T16:02:44.264Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f71484d88663aeae5e

Added to database: 5/20/2025, 6:59:03 PM

Last enriched: 7/11/2025, 1:04:40 PM

Last updated: 8/17/2025, 9:41:19 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats