CVE-2025-47705

6.1 MEDIUM

📋 TL;DR

This vulnerability allows attackers to inject malicious scripts into web pages generated by Drupal IFrame Remove Filter, leading to cross-site scripting (XSS) attacks. It affects Drupal sites using vulnerable versions of the IFrame Remove Filter module. Attackers could steal session cookies, redirect users, or perform actions on behalf of authenticated users.

💻 Affected Systems

Products:
  • Drupal IFrame Remove Filter
Versions: 2.0.0 to 2.0.4, 7.X-1.0 to 7.X-1.5, 1.0 to 1.2
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Drupal sites with the IFrame Remove Filter module enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers steal administrator credentials, take over the Drupal site, and compromise all user data.

🟠

Likely Case

Attackers steal user session cookies to hijack accounts and perform unauthorized actions.

🟢

If Mitigated

Limited impact with proper input validation and output encoding in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

XSS vulnerabilities typically have low exploitation complexity and can be exploited without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.0.5, 7.X-1.6, 1.3

Vendor Advisory: https://www.drupal.org/sa-contrib-2025-051

Restart Required: No

Instructions:

1. Update the IFrame Remove Filter module to the patched version via Drupal's update manager. 2. Clear Drupal caches after update. 3. Verify the module version in the Drupal admin interface.

🔧 Temporary Workarounds

Disable IFrame Remove Filter Module

linux

Temporarily disable the vulnerable module until patched.

drush pm-disable iframe_remove_filter

Implement Content Security Policy (CSP)

all

Add CSP headers to mitigate XSS impact.

Add 'Content-Security-Policy' header to web server configuration

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block XSS payloads.
  • Enable Drupal's built-in XSS protection features and input validation.

🔍 How to Verify

Check if Vulnerable:

Check the IFrame Remove Filter module version in Drupal admin at /admin/modules or via 'drush pm-list'.

Check Version:

drush pm-list | grep iframe_remove_filter

Verify Fix Applied:

Confirm module version is 2.0.5, 7.X-1.6, or 1.3 or higher.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests with script tags or JavaScript payloads to Drupal endpoints.

Network Indicators:

  • HTTP requests containing malicious script injections in parameters.

SIEM Query:

source="drupal_access.log" AND ("<script" OR "javascript:" OR "onerror=" OR "onload=")

🔗 References

📤 Share & Export