CVE-2025-3057

6.1 MEDIUM

📋 TL;DR

This Cross-Site Scripting (XSS) vulnerability in Drupal core allows attackers to inject malicious scripts into web pages viewed by other users. It affects Drupal installations running vulnerable versions, potentially compromising user sessions and data. All Drupal sites using affected versions are at risk unless patched.

💻 Affected Systems

Products:
  • Drupal core
Versions: 8.0.0 to 10.3.12, 10.4.0 to 10.4.2, 11.0.0 to 11.0.11, 11.1.0 to 11.1.2
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All Drupal installations using affected versions are vulnerable by default. No special configuration required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, take over administrative accounts, deface websites, or redirect users to malicious sites, potentially leading to complete site compromise.

🟠

Likely Case

Attackers steal user session cookies, perform actions on behalf of authenticated users, or deface public-facing content.

🟢

If Mitigated

With proper input validation and output encoding in custom modules, impact is limited to specific vulnerable components only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction or authenticated access. The vulnerability is in input handling during web page generation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.3.13, 10.4.3, 11.0.12, 11.1.3

Vendor Advisory: https://www.drupal.org/sa-core-2025-001

Restart Required: No

Instructions:

1. Backup your Drupal site and database. 2. Update Drupal core using Composer: 'composer update drupal/core-recommended --with-dependencies'. 3. Clear all caches: 'drush cr' or via admin interface. 4. Verify update completed successfully.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement strict input validation and output encoding in custom modules and themes

Implement Drupal's Form API validation
Use Html::escape() or check_plain() for output

🧯 If You Can't Patch

  • Implement Web Application Firewall (WAF) with XSS protection rules
  • Restrict user input fields and implement content security policy (CSP) headers

🔍 How to Verify

Check if Vulnerable:

Check Drupal version at /admin/reports/status or via 'drush status' command

Check Version:

drush status | grep 'Drupal version' or check /admin/reports/status

Verify Fix Applied:

Verify version is 10.3.13+, 10.4.3+, 11.0.12+, or 11.1.3+

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests with script tags
  • Multiple failed input validation attempts
  • Unexpected content modifications

Network Indicators:

  • HTTP requests containing script injection patterns
  • Unusual outbound connections after form submissions

SIEM Query:

web.logs: (*.js OR javascript: OR <script*) AND status:200 AND uri.path:/node/*

🔗 References

📤 Share & Export