VYPR
Medium severityNVD Advisory· Published May 21, 2026

CVE-2026-4093

CVE-2026-4093

Description

In the Drupal 7 Term Reference Tree module, two stored XSS vectors exist in the widget/formatter rendering pipeline.

Vector A (token display templates): When the Token module is enabled and token display templates are configured, attacker-controlled token output (e.g., term description) is rendered without proper sanitization. Any user who can edit the referenced taxonomy terms can inject HTML/JS that executes when the field is rendered.

Vector B (term label rendering): Taxonomy term labels are not properly sanitized before being rendered in the widget, allowing a user with permission to create or edit taxonomy terms to inject scripts into the term name that execute when a form containing the widget is viewed.

Exploit affects versions 7.x-1.x up to and including 7.x-1.11.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

CVE-2026-4093 describes two stored XSS vulnerabilities in the Drupal 7 Term Reference Tree module, allowing attackers to inject scripts via token output or unsanitized term labels.

Vulnerability

Overview

CVE-2026-4093 identifies two stored cross-site scripting (XSS) vulnerabilities in the Drupal 7 Term Reference Tree module (versions 7.x-1.x up to and including 7.x-1.11). The first vector occurs when the Token module is enabled: if token display templates are configured, attacker-controlled token output (e.g., term description) is rendered without proper sanitization, allowing HTML/JS injection. The second vector stems from taxonomy term labels not being properly escaped before being rendered in the widget, enabling an attacker with term creation or editing permissions to inject malicious scripts into the term name [1][2].

Attack

Vector and Prerequisites

Both attack vectors require the user to have administrative-level permissions—specifically the ability to create or edit taxonomy terms—to inject malicious content. For the token-based vector, the Token module must be enabled and the widget configured to use token display templates. The XSS is triggered when a victim views a page containing the vulnerable widget or form, executing the injected script in their browser [1][2].

Impact

Successful exploitation allows an attacker to execute arbitrary JavaScript in the context of the victim's browser, potentially leading to session hijacking, data theft, defacement, phishing attacks, or privilege escalation. Since the vulnerability is stored, any user visiting the affected page is at risk [1].

Mitigation

The vendor has released a fix in Term Reference Tree 7.x-1.12. Users are strongly advised to upgrade immediately. No workaround is provided for unpatched versions. The vulnerability is not currently listed in the Known Exploited Vulnerabilities Catalog [2].

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.