CVE-2025-7392: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Drupal Cookies Addons
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal Cookies Addons allows Cross-Site Scripting (XSS).This issue affects Cookies Addons: from 1.0.0 before 1.2.4.
AI Analysis
Technical Summary
CVE-2025-7392 is a Cross-Site Scripting (XSS) vulnerability classified under CWE-79, affecting the Drupal Cookies Addons module versions from 1.0.0 up to but not including 1.2.4. This vulnerability arises due to improper neutralization of input during web page generation, specifically in how the Cookies Addons module processes user-supplied input. An attacker can exploit this flaw by injecting malicious scripts into web pages generated by the vulnerable module, which are then executed in the context of users' browsers. The CVSS v3.1 base score is 6.1, indicating a medium severity level. The vector string (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) reveals that the attack can be performed remotely over the network without privileges or authentication but requires user interaction (e.g., clicking a crafted link). The scope is changed, meaning the vulnerability affects resources beyond the vulnerable component itself. The impact affects confidentiality and integrity to a limited extent but does not impact availability. No known exploits are currently reported in the wild, and no patches are linked yet, suggesting that the vulnerability is newly disclosed. The Drupal Cookies Addons module is used to manage cookie-related functionalities in Drupal-based websites, which are widely deployed across various sectors. The vulnerability could allow attackers to steal session cookies, perform actions on behalf of users, or conduct phishing attacks by injecting malicious scripts, thereby compromising user data and trust.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those relying on Drupal-based websites that utilize the Cookies Addons module. Given Drupal's popularity in government, education, and enterprise sectors across Europe, exploitation could lead to unauthorized access to sensitive user information, session hijacking, and potential defacement or manipulation of web content. This can result in reputational damage, legal liabilities under GDPR due to data breaches, and operational disruptions. Since the vulnerability requires user interaction, phishing campaigns targeting European users could be an effective attack vector. The confidentiality and integrity of user data are at risk, which is critical for sectors handling personal or financial information. Although availability is not directly impacted, the indirect effects of compromised trust and potential regulatory fines could be substantial.
Mitigation Recommendations
European organizations should immediately audit their Drupal installations to identify the presence of the Cookies Addons module and verify the version in use. Upgrading to version 1.2.4 or later, once available, is essential to remediate the vulnerability. In the interim, organizations should implement strict Content Security Policies (CSP) to restrict script execution and reduce XSS risks. Input validation and output encoding should be reviewed and enhanced in custom modules or themes interacting with Cookies Addons. Web Application Firewalls (WAFs) can be configured to detect and block typical XSS attack patterns targeting this module. User awareness training should emphasize caution with unsolicited links or inputs to mitigate the user interaction requirement. Additionally, monitoring web logs for unusual requests or script injections can help detect exploitation attempts early. Organizations should also subscribe to Drupal security advisories to receive timely updates and patches.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Italy, Spain, Poland
CVE-2025-7392: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Drupal Cookies Addons
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal Cookies Addons allows Cross-Site Scripting (XSS).This issue affects Cookies Addons: from 1.0.0 before 1.2.4.
AI-Powered Analysis
Technical Analysis
CVE-2025-7392 is a Cross-Site Scripting (XSS) vulnerability classified under CWE-79, affecting the Drupal Cookies Addons module versions from 1.0.0 up to but not including 1.2.4. This vulnerability arises due to improper neutralization of input during web page generation, specifically in how the Cookies Addons module processes user-supplied input. An attacker can exploit this flaw by injecting malicious scripts into web pages generated by the vulnerable module, which are then executed in the context of users' browsers. The CVSS v3.1 base score is 6.1, indicating a medium severity level. The vector string (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) reveals that the attack can be performed remotely over the network without privileges or authentication but requires user interaction (e.g., clicking a crafted link). The scope is changed, meaning the vulnerability affects resources beyond the vulnerable component itself. The impact affects confidentiality and integrity to a limited extent but does not impact availability. No known exploits are currently reported in the wild, and no patches are linked yet, suggesting that the vulnerability is newly disclosed. The Drupal Cookies Addons module is used to manage cookie-related functionalities in Drupal-based websites, which are widely deployed across various sectors. The vulnerability could allow attackers to steal session cookies, perform actions on behalf of users, or conduct phishing attacks by injecting malicious scripts, thereby compromising user data and trust.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those relying on Drupal-based websites that utilize the Cookies Addons module. Given Drupal's popularity in government, education, and enterprise sectors across Europe, exploitation could lead to unauthorized access to sensitive user information, session hijacking, and potential defacement or manipulation of web content. This can result in reputational damage, legal liabilities under GDPR due to data breaches, and operational disruptions. Since the vulnerability requires user interaction, phishing campaigns targeting European users could be an effective attack vector. The confidentiality and integrity of user data are at risk, which is critical for sectors handling personal or financial information. Although availability is not directly impacted, the indirect effects of compromised trust and potential regulatory fines could be substantial.
Mitigation Recommendations
European organizations should immediately audit their Drupal installations to identify the presence of the Cookies Addons module and verify the version in use. Upgrading to version 1.2.4 or later, once available, is essential to remediate the vulnerability. In the interim, organizations should implement strict Content Security Policies (CSP) to restrict script execution and reduce XSS risks. Input validation and output encoding should be reviewed and enhanced in custom modules or themes interacting with Cookies Addons. Web Application Firewalls (WAFs) can be configured to detect and block typical XSS attack patterns targeting this module. User awareness training should emphasize caution with unsolicited links or inputs to mitigate the user interaction requirement. Additionally, monitoring web logs for unusual requests or script injections can help detect exploitation attempts early. Organizations should also subscribe to Drupal security advisories to receive timely updates and patches.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- drupal
- Date Reserved
- 2025-07-09T16:03:34.228Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 687e7252a83201eaac11c50a
Added to database: 7/21/2025, 5:01:06 PM
Last enriched: 7/29/2025, 1:25:21 AM
Last updated: 8/12/2025, 10:52:24 PM
Views: 24
Related Threats
CVE-2025-55716: CWE-862 Missing Authorization in VeronaLabs WP Statistics
MediumCVE-2025-55714: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Crocoblock JetElements For Elementor
MediumCVE-2025-55713: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in CreativeThemes Blocksy
MediumCVE-2025-55712: CWE-862 Missing Authorization in POSIMYTH The Plus Addons for Elementor Page Builder Lite
MediumCVE-2025-55710: CWE-201 Insertion of Sensitive Information Into Sent Data in Steve Burge TaxoPress
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.