CVE-2025-12848
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-11-26

Last updated on: 2026-03-26

Assigner: Drupal.org

Description
Webform Multiple File Upload module for Drupal 7.x contains a cross-site scripting (XSS) vulnerability in the file name renderer. An unauthenticated attacker can exploit this vulnerability by uploading a file with a malicious filename containing JavaScript code (e.g., "<img src=1 onerror=alert(document.domain)>") to a Webform node with a Multifile field where file type validation is disabled. This allows the execution of arbitrary scripts in the context of the victim's browser. The issue is present in a third-party library and has been addressed in a patch available atΒ  https://github.com/fyneworks/multifile/pull/44 . Users are advised to apply the provided patch or update to a fixed version of the module.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-11-26
Last Modified
2026-03-26
Generated
2026-05-07
AI Q&A
2025-11-26
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 6 associated CPEs
Vendor Product Version / Range
webform_multiple_file_upload_project webform_multiple_file_upload 7.x-1.2
webform_multiple_file_upload_project webform_multiple_file_upload 7.x-1.3
webform_multiple_file_upload_project webform_multiple_file_upload 7.x-1.4
webform_multiple_file_upload_project webform_multiple_file_upload 7.x-1.5
webform_multiple_file_upload_project webform_multiple_file_upload 7.x-1.6
webform_multiple_file_upload_project webform_multiple_file_upload 7.x-1.x
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a cross-site scripting (XSS) issue in the Webform Multiple File Upload module for Drupal 7.x. An unauthenticated attacker can upload a file with a malicious filename containing JavaScript code to a Webform node with a Multifile field where file type validation is disabled. This causes the malicious script to execute in the victim's browser context when the filename is rendered.


How can this vulnerability impact me? :

The vulnerability allows attackers to execute arbitrary scripts in the context of a victim's browser. This can lead to theft of sensitive information, session hijacking, or other malicious actions performed on behalf of the victim without their consent.


What immediate steps should I take to mitigate this vulnerability?

Apply the patch available at https://github.com/fyneworks/multifile/pull/44 or update to a fixed version of the Webform Multiple File Upload module for Drupal 7.x. Additionally, ensure that file type validation is enabled on Multifile fields to prevent uploading files with malicious filenames.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart