CVE-2025-47703

6.1 MEDIUM

📋 TL;DR

This Cross-Site Scripting (XSS) vulnerability in Drupal's COOKiES Consent Management module allows attackers to inject malicious scripts into web pages. When exploited, these scripts execute in victims' browsers, potentially stealing session cookies, redirecting users, or performing actions on their behalf. All Drupal sites using vulnerable versions of the COOKiES Consent Management module are affected.

💻 Affected Systems

Products:
  • Drupal COOKiES Consent Management
Versions: 0.0.0 through 1.2.13
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Drupal sites with the COOKiES Consent Management module installed and enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers steal administrator session cookies, gain full administrative access to the Drupal site, install backdoors, exfiltrate sensitive data, or deface the website.

🟠

Likely Case

Attackers steal user session cookies to hijack accounts, redirect users to phishing sites, or perform actions on behalf of authenticated users.

🟢

If Mitigated

With proper input validation and output encoding, malicious scripts are neutralized before reaching users' browsers, preventing exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

XSS vulnerabilities typically have low exploitation complexity, especially when unauthenticated exploitation is possible.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.2.14

Vendor Advisory: https://www.drupal.org/sa-contrib-2025-049

Restart Required: No

Instructions:

1. Log into Drupal admin panel. 2. Navigate to Extend > Update. 3. Check for available updates. 4. Update COOKiES Consent Management module to version 1.2.14. 5. Clear Drupal caches.

🔧 Temporary Workarounds

Disable COOKiES Consent Management Module

linux

Temporarily disable the vulnerable module until patching is possible.

drush pm-disable cookies_consent_management

Implement Content Security Policy

all

Add CSP headers to restrict script execution sources.

Add 'Content-Security-Policy' header to web server configuration

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block XSS payloads
  • Enable Drupal's built-in XSS protection features and ensure input validation is enforced

🔍 How to Verify

Check if Vulnerable:

Check Drupal admin panel at Extend > Installed modules for COOKiES Consent Management version.

Check Version:

drush pm-list --fields=name,version | grep cookies_consent_management

Verify Fix Applied:

Confirm module version is 1.2.14 or higher in Drupal admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests with script tags or JavaScript payloads to module endpoints
  • Multiple failed XSS attempts in web server logs

Network Indicators:

  • HTTP requests containing <script>, javascript:, or encoded XSS payloads

SIEM Query:

source="web_server_logs" AND ("<script>" OR "javascript:" OR "onload=" OR "onerror=") AND uri="*cookies*"

🔗 References

📤 Share & Export