Kritische XSS-Lücke in Drupal-Modul "Tagify" - CVE-2026-3212

⚠️ CVE-Referenzen: CVE-2026-3212 CVE-2026-3213 CVE-2026-3218

Zusammenfassung

Das Drupal-Modul "Tagify" weist eine moderate Sicherheitslücke auf, die es Angreifern ermöglicht, beliebigen JavaScript-Code auf der Zielseite auszuführen. Dies kann zu Identitätsdiebstahl, Datenmanipulation oder anderen böswilligen Aktivitäten führen. Nutzer sollten umgehend auf die neueste Version des Moduls aktualisieren, um sich vor dieser Schwachstelle zu schützen.

Project: TagifyDate: 2026-February-25Security risk: Moderately critical 13 ∕ 25 AC:Basic/A:User/CI:Some/II:Some/E:Theoretical/TD:DefaultVulnerability: Cross-site scriptingAffected versions: <1.2.49CVE IDs: CVE-2026-3212Description: This module integrates the Tagify JavaScript library to enhance taxonomy entity reference widgets. The module does not sufficiently sanitise user-supplied input before rendering it inside JavaScript template strings within the Tagify widget. This allows arbitrary JavaScript execution in the browser when a user creates or edits content.Solution: Install the latest version: If you use the Tagify module, upgrade to Tagify 1.2.49 or later. Reported By:  David López (akalam) Mingsong (mingsong) provisional member of the Drupal Security Team Fixed By:  David López (akalam) David Galeano (gxleano) Mingsong (mingsong) provisional member of the Drupal Security Team Coordinated By:  Damien McKenna (damienmckenna) of the Drupal Security Team Dan Smith (galooph) of the Drupal Security Team Greg Knaddison (greggles) of the Drupal Security Team Drew Webber (mcdruid) of the Drupal Security Team Jess (xjm) of the Drupal Security Team
Quelle: www.drupal.org