Description
In the Drupal 7 Term Reference Tree module, two stored XSS vectors exist in the widget/formatter rendering pipeline.

Vector A (token display templates): When the Token module is enabled and token display templates are configured, attacker-controlled token output (e.g., term description) is rendered without proper sanitization. Any user who can edit the referenced taxonomy terms can inject HTML/JS that executes when the field is rendered.

Vector B (term label rendering): Taxonomy term labels are not properly sanitized before being rendered in the widget, allowing a user with permission to create or edit taxonomy terms to inject scripts into the term name that execute when a form containing the widget is viewed.

Exploit affects versions 7.x-1.x up to and including 7.x-1.11.
Published: 2026-05-21
Score: 5.1 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Drupal 7 Term Reference Tree module contains two stored XSS vectors that allow an attacker to inject and execute arbitrary HTML or JavaScript whenever a field that uses the widget or formatter is rendered. The first vector exploits the lack of sanitization in token display templates when the Token module is enabled and an attacker controls token output such as a term description, while the second vector originates from unsanitized taxonomy term labels, permitting a user with permission to create or edit terms to embed scripts that execute when any form containing the widget is viewed. Both vectors are cross‑site scripting weaknesses (CWE‑79) that can compromise the confidentiality and integrity of a user's session without providing direct access to the server.

Affected Systems

Affected systems include deployments of Drupal 7 that employ the Term Reference Tree module at any 7.x‑1.x release through version 7.x‑1.11. The module is part of the Drupal ecosystem and is identified by the CNA as Drupal:Term Reference Tree. Administrators of sites that use this widget and allow token display templates or editing of taxonomy terms to be performed by ordinary users are most at risk.

Risk and Exploitability

The vulnerability has a CVSS score of 5.1, indicating moderate severity, and is not currently listed in CISA's KEV catalog. While an EPSS score is not available, the likelihood of exploitation cannot be quantified precisely; however, the attack requires only the ability to create or edit terms, a capability typically granted to many site editors. Exploitation can be achieved simply by inserting malicious markup into a term description or label, which renders unchanged when the widget is displayed. Once executed, the payload runs in the context of any user who views the affected page, potentially leading to session hijacking, defacement, or phishing attacks.

Generated by OpenCVE AI on May 21, 2026 at 23:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Term Reference Tree module to the latest available version that includes a fix for this issue (any release above 7.x‑1.11, if available).
  • Disable or remove the Token module's token display templates for fields that use the widget, or configure them to use strict sanitization so that no unsanitized token output can be stored.
  • Restrict permissions so that only trusted administrators can create or edit taxonomy terms and token display templates, effectively limiting the attack surface.

Generated by OpenCVE AI on May 21, 2026 at 23:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 21 May 2026 22:15:00 +0000

Type Values Removed Values Added
Description In the Drupal 7 Term Reference Tree module, two stored XSS vectors exist in the widget/formatter rendering pipeline. Vector A (token display templates): When the Token module is enabled and token display templates are configured, attacker-controlled token output (e.g., term description) is rendered without proper sanitization. Any user who can edit the referenced taxonomy terms can inject HTML/JS that executes when the field is rendered. Vector B (term label rendering): Taxonomy term labels are not properly sanitized before being rendered in the widget, allowing a user with permission to create or edit taxonomy terms to inject scripts into the term name that execute when a form containing the widget is viewed. Exploit affects versions 7.x-1.x up to and including 7.x-1.11.
Title Stored XSS in Drupal 7 Term Reference Tree module (token display templates and term labels)
Weaknesses CWE-79
References
Metrics cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: drupal

Published:

Updated: 2026-05-21T21:50:42.339Z

Reserved: 2026-03-12T22:40:32.279Z

Link: CVE-2026-4093

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-21T22:16:48.290

Modified: 2026-05-21T22:16:48.290

Link: CVE-2026-4093

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-21T23:30:22Z

Weaknesses