{"id":"DRUPAL-CONTRIB-2025-116","details":"This module provides the ability to convert any entity form into a simple multi-step form.\n\nThe module doesn’t sufficiently filter certain user-provided text leading to a cross-site scripting (XSS) vulnerability.\n\nThis vulnerability is mitigated by the fact that an attacker must have a role with the permission “administer node form display”.","aliases":["CVE-2025-12761","GHSA-gg35-374m-9ph8"],"modified":"2025-12-10T23:41:21.015046Z","published":"2025-11-05T18:09:13Z","references":[{"type":"WEB","url":"https://www.drupal.org/sa-contrib-2025-116"}],"affected":[{"package":{"name":"drupal/simple_multistep","ecosystem":"Packagist:https://packages.drupal.org/8","purl":"pkg:composer/drupal/simple_multistep"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.0.0"}],"database_specific":{"constraint":"\u003c2.0.0"}}],"database_specific":{"source":"https://github.com/DrupalSecurityTeam/drupal-advisory-database/blob/main/advisories/simple_multistep/DRUPAL-CONTRIB-2025-116.json","affected_versions":"\u003c2.0.0"}}],"schema_version":"1.7.3","credits":[{"name":"Ide Braakman (idebr)","contact":["https://www.drupal.org/u/idebr"]}]}