DRUPAL-CONTRIB-2025-032

See a problem?
Import Source
https://github.com/DrupalSecurityTeam/drupal-advisory-database/blob/main/advisories/gifplayer/DRUPAL-CONTRIB-2025-032.json
JSON Data
https://api.osv.dev/v1/vulns/DRUPAL-CONTRIB-2025-032
Aliases
Published
2025-04-09T17:04:46Z
Modified
2025-12-10T23:41:08.409212Z
Summary
[none]
Details

Gif Player Field creates a simple file field types that allows you to upload the GIF files and configure the output for this using the Field Formatters.

The module uses GifPlayer jQuery library to render the GIF according to configured setups for the Field Formatter. The external Gif Player Library doesn't satinize the attributes properly when rendering the widget, allowing a malicious user to run XSS attacks.

This vulnerability is mitigated by the fact that an attacker would need to have an account on the website and be able to create an image tag with a data-label element. There are no fields that allow that element on a default Drupal site for a user with user-level permissions.

References
Credits

Affected packages

Packagist:https://packages.drupal.org/8 / drupal/gifplayer

Package

Name
drupal/gifplayer
Purl
pkg:composer/drupal/gifplayer

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.5.0
Database specific
{
    "constraint": "<1.5.0"
}
Type
ECOSYSTEM
Events
Introduced
2.0.1
Fixed
2.0.4
Database specific
{
    "constraint": ">=2.0.1 <2.0.4"
}

Database specific

affected_versions

"<1.5.0 || >=2.0.1 <2.0.4"

patched

true

source

"https://github.com/DrupalSecurityTeam/drupal-advisory-database/blob/main/advisories/gifplayer/DRUPAL-CONTRIB-2025-032.json"