CVE-2026-4093
Description
In the Drupal 7 Term Reference Tree module, two stored XSS vectors exist in the widget/formatter rendering pipeline.
Vector A (token display templates): When the Token module is enabled and token display templates are configured, attacker-controlled token output (e.g., term description) is rendered without proper sanitization. Any user who can edit the referenced taxonomy terms can inject HTML/JS that executes when the field is rendered.
Vector B (term label rendering): Taxonomy term labels are not properly sanitized before being rendered in the widget, allowing a user with permission to create or edit taxonomy terms to inject scripts into the term name that execute when a form containing the widget is viewed.
Exploit affects versions 7.x-1.x up to and including 7.x-1.11.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
CVE-2026-4093 describes two stored XSS vulnerabilities in the Drupal 7 Term Reference Tree module, allowing attackers to inject scripts via token output or unsanitized term labels.
Vulnerability
Overview
CVE-2026-4093 identifies two stored cross-site scripting (XSS) vulnerabilities in the Drupal 7 Term Reference Tree module (versions 7.x-1.x up to and including 7.x-1.11). The first vector occurs when the Token module is enabled: if token display templates are configured, attacker-controlled token output (e.g., term description) is rendered without proper sanitization, allowing HTML/JS injection. The second vector stems from taxonomy term labels not being properly escaped before being rendered in the widget, enabling an attacker with term creation or editing permissions to inject malicious scripts into the term name [1][2].
Attack
Vector and Prerequisites
Both attack vectors require the user to have administrative-level permissions—specifically the ability to create or edit taxonomy terms—to inject malicious content. For the token-based vector, the Token module must be enabled and the widget configured to use token display templates. The XSS is triggered when a victim views a page containing the vulnerable widget or form, executing the injected script in their browser [1][2].
Impact
Successful exploitation allows an attacker to execute arbitrary JavaScript in the context of the victim's browser, potentially leading to session hijacking, data theft, defacement, phishing attacks, or privilege escalation. Since the vulnerability is stored, any user visiting the affected page is at risk [1].
Mitigation
The vendor has released a fix in Term Reference Tree 7.x-1.12. Users are strongly advised to upgrade immediately. No workaround is provided for unpatched versions. The vulnerability is not currently listed in the Known Exploited Vulnerabilities Catalog [2].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2<=7.x-1.11+ 1 more
- (no CPE)range: <=7.x-1.11
- (no CPE)range: <=7.x-1.11
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.