Simple multi step form - Moderately critical - Cross-site Scripting - SA-CONTRIB-2025-116
Description
Improper Neutralization of Input During Web Page Generation ("Cross-site Scripting") vulnerability in Drupal Simple multi step form allows Cross-Site Scripting (XSS).This issue affects Simple multi step form: from 0.0.0 before 2.0.0.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A stored XSS vulnerability in Drupal's Simple multi step form module allows attackers with node form display admin rights to inject arbitrary scripts.
Vulnerability
Overview
The Simple multi step form module for Drupal fails to properly sanitize user-provided input during web page generation, leading to a stored cross-site scripting (XSS) vulnerability [1]. This issue affects all versions from 0.0.0 up to, but not including, 2.0.0 [1]. The root cause is improper neutralization of input, which allows an attacker to inject malicious scripts that are later executed in the context of other users' browsers.
Exploitation
Prerequisites
Exploitation requires the attacker to have a Drupal role with the "administer node form display" permission [2]. This permission is typically granted to trusted site administrators, which somewhat limits the attack surface but does not eliminate the risk, especially in multi-tenant or delegated administration scenarios. The vulnerability is triggered when the injected content is rendered on a page viewed by other users.
Impact
Successful exploitation enables an attacker to execute arbitrary JavaScript in the browsers of other users, including site administrators. This can lead to session hijacking, defacement, data theft, or further privilege escalation within the Drupal site [2]. The severity is considered moderately critical by the Drupal security team.
Mitigation
The Drupal project has released a fix in the 2.x branch of the module. Users are strongly advised to upgrade to a release from the 2.x branch immediately, as the 8.x-1.x branch is now unsupported and will not receive further security updates [2]. No workarounds are provided; upgrading is the only recommended solution.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
drupal/simple_multistepPackagist | < 2.0.0 | 2.0.0 |
Affected products
2- Range: >=0.0.0 <2.0.0
- Drupal/Simple multi step formv5Range: 0.0.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-gg35-374m-9ph8ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-12761ghsaADVISORY
- www.drupal.org/sa-contrib-2025-116ghsaWEB
News mentions
0No linked articles in our index yet.