Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0946: CWE-79 Improper Neutralization of Input During Web Page Generation ("Cross-site Scripting") in Drupal AT Internet SmartTag

0
Medium
VulnerabilityCVE-2026-0946cvecve-2026-0946cwe-79
Published: Wed Feb 04 2026 (02/04/2026, 20:25:39 UTC)
Source: CVE Database V5
Vendor/Project: Drupal
Product: AT Internet SmartTag

Description

Improper Neutralization of Input During Web Page Generation ("Cross-site Scripting") vulnerability in Drupal AT Internet SmartTag allows Cross-Site Scripting (XSS).This issue affects AT Internet SmartTag: from 0.0.0 before 1.0.1.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/12/2026, 07:20:33 UTC

Technical Analysis

CVE-2026-0946 identifies a Cross-Site Scripting (XSS) vulnerability in the Drupal AT Internet SmartTag module, specifically affecting versions prior to 1.0.1. The root cause is improper neutralization of input during web page generation, classified under CWE-79. This flaw allows an attacker to inject malicious JavaScript code into web pages rendered by the vulnerable module. When a victim user interacts with the maliciously crafted content, the injected script executes in their browser context, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The vulnerability is remotely exploitable over the network without requiring authentication, but does require user interaction such as clicking a malicious link or visiting a compromised page. The CVSS v3.1 base score of 6.1 reflects a medium severity rating, with attack vector being network, low attack complexity, no privileges required, but user interaction needed. The scope is changed, indicating that exploitation affects components beyond the vulnerable module itself. Confidentiality and integrity impacts are low but present, while availability is unaffected. No public exploits have been reported yet, but the vulnerability is publicly disclosed and should be addressed promptly. The affected product, Drupal AT Internet SmartTag, is a module used for web analytics and tracking, often integrated into websites for user behavior insights. Failure to patch could allow attackers to compromise user sessions or manipulate displayed content, undermining trust and potentially leading to further attacks.

Potential Impact

For European organizations, the impact of CVE-2026-0946 can be significant, particularly for those operating public-facing websites using Drupal with the AT Internet SmartTag module. Successful exploitation can lead to theft of user session cookies or credentials, enabling attackers to impersonate legitimate users and access sensitive information. This can result in data breaches, unauthorized transactions, or defacement of websites. The integrity of web content can be compromised, damaging organizational reputation and user trust. While availability is not directly impacted, the indirect effects of compromised user accounts or manipulated content can disrupt business operations and lead to regulatory scrutiny under GDPR for failure to protect personal data. Organizations in sectors such as e-commerce, government services, and media are especially vulnerable due to their reliance on web presence and user interaction. The lack of known exploits in the wild provides a window for proactive mitigation, but the medium severity rating indicates that the threat should not be underestimated.

Mitigation Recommendations

1. Immediately upgrade the Drupal AT Internet SmartTag module to version 1.0.1 or later once it is released to address this vulnerability. 2. Until a patch is available, implement strict input validation and sanitization on all user-supplied data that could be processed by the SmartTag module to prevent injection of malicious scripts. 3. Deploy Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on web pages, mitigating the impact of potential XSS attacks. 4. Conduct thorough security testing and code reviews of any customizations involving the SmartTag module to identify and remediate similar input handling issues. 5. Educate users and administrators about the risks of clicking unknown links or interacting with suspicious content to reduce the likelihood of successful exploitation. 6. Monitor web server and application logs for unusual activity or signs of attempted XSS exploitation. 7. Consider implementing web application firewalls (WAFs) with rules tailored to detect and block XSS attack patterns targeting Drupal modules. 8. Maintain an up-to-date inventory of Drupal modules and versions deployed to ensure timely identification of vulnerable components.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
drupal
Date Reserved
2026-01-14T16:52:30.774Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6983afd6f9fa50a62fabdb2b

Added to database: 2/4/2026, 8:45:10 PM

Last enriched: 2/12/2026, 7:20:33 AM

Last updated: 3/24/2026, 11:13:46 AM

Views: 58

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses