CVE-2026-4929
Received Received - Intake
Simple Hierarchical Select Drupal Module XSS Vulnerability

Publication date: 2026-05-21

Last updated on: 2026-05-22

Assigner: Drupal.org

Description
Simple Hierarchical Select (SHS) for Drupal 7 contains cross-site scripting risk due to improper output escaping of term-derived text. Confirmed affected paths include field formatter output (shs_field_formatter_view) and term-tree child-term data generation (shs_term_get_children). Malicious taxonomy term names can be rendered unsafely depending on output context. This affects versions from 7.x-1.0 through (and including) 7.x-1.10.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-21
Last Modified
2026-05-22
Generated
2026-05-22
AI Q&A
2026-05-22
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
drupal simple_hierarchical_select From 7.x-1.0 (inc) to 7.x-1.10 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability in Simple Hierarchical Select (SHS) for Drupal 7 is a cross-site scripting (XSS) risk due to improper output escaping of term-derived text. This type of vulnerability can potentially lead to unauthorized access or manipulation of data through malicious scripts.

While the CVE description does not explicitly mention compliance with standards such as GDPR or HIPAA, XSS vulnerabilities generally pose risks to data confidentiality and integrity, which are critical aspects of these regulations. Exploitation could lead to exposure or alteration of sensitive information, thereby impacting compliance.

Therefore, organizations using affected versions of SHS should consider this vulnerability as a factor in their security posture and compliance assessments, as failure to address it might result in non-compliance with data protection requirements.


Can you explain this vulnerability to me?

The vulnerability in Simple Hierarchical Select (SHS) for Drupal 7 is a cross-site scripting (XSS) risk caused by improper output escaping of text derived from taxonomy terms. This means that maliciously crafted taxonomy term names can be rendered unsafely in certain parts of the application, such as field formatter output and term-tree child-term data generation, potentially allowing attackers to inject and execute malicious scripts.


How can this vulnerability impact me? :

This vulnerability can allow attackers to execute malicious scripts in the context of the affected Drupal site. This can lead to unauthorized actions such as stealing user session data, defacing the website, redirecting users to malicious sites, or performing actions on behalf of authenticated users, thereby compromising the security and integrity of the site.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring for malicious or unexpected HTML content in taxonomy term names, especially those created or modified by administrative users. Since the issue involves unescaped term-derived text being rendered, inspecting term labels for suspicious markup is key.

Additionally, increasing logging for taxonomy term edits can help detect attempts to inject malicious content.

Specific commands are not provided in the resources, but general approaches include querying the Drupal database for taxonomy terms containing suspicious HTML or script tags, for example using SQL queries like:

  • SELECT tid, name FROM taxonomy_term_data WHERE name LIKE '%<script>%';
  • Reviewing web server logs or application logs for unusual AJAX requests or unexpected output in SHS field formatter paths may also help.

What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include:

  • Upgrade the Simple Hierarchical Select (SHS) module to version 7.x-1.12 or later, where the vulnerability is fixed.
  • If upgrading is not immediately possible, disable the SHS module to prevent exploitation.
  • Add proper output escaping and sanitization for taxonomy term names, especially on save.
  • Restrict permissions to edit taxonomy terms to trusted administrative users only.
  • Implement Web Application Firewall (WAF) rules to block malicious payloads targeting term names.
  • Increase logging and monitoring of taxonomy term edits to detect potential exploitation attempts.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart