CVE-2026-0749

Cross-Site Scripting
Affects
Form Builder Drupal Module
in
Drupal 7
No items found.
Versions
>=7.1.0 <=7.1.22
Exclamation circle icon
Patch Available

This Vulnerability has been fixed in the Never-Ending Support (NES) version offered by HeroDevs.

Overview

Drupal is an open-source content management system known for its flexibility, robust features, and strong community support. Organizations of all sizes use it to build and manage dynamic websites and web applications. There is a cross-site scripting vulnerability in the Form Builder contributed module.

It’s possible to inject malicious Javascript code into the JavaScript-based form building system provided by the Form Builder contributed module.

A cross-site scripting (XSS) vulnerability allows attackers to inject malicious scripts into webpages. It often occurs when a site fails to properly validate or sanitize user input, enabling the execution of unauthorized code within a victim's browser. It is included in the OWASP Top Ten list of vulnerabilities, specifically in the third category of Injection. A web site compromised in this way may experience:

  • Session hijacking
  • Data theft
  • Malware distribution
  • Defacement or phishing and
  • Privilege escalation.

This issue affects all versions of Drupal 7 Form Builder including and below 7.1.22; it is patched  in Form Builder NES 7.1.23.

Details

Module Info

Vulnerability Info

This medium-severity vulnerability is found in all versions of the Form Builder module up to and including 7.1.22.

Steps To Reproduce

  1. Install Drupal 7 NES 7.103 or later.
  2. Set webflo/drupal-finder to version 1.2.1 (later versions require PHP 8.x).
  3. Install Webform and a susceptible version of Form Builder, such as 7.1.22.
  4. Enable the Webform, Form Builder, Form Builder Examples and Form Builder Webform modules.
  5. Add a block:
    • Go to admin/structure/block/list/seven/add.
    • Provide a title and block description.
    • Under the block body, ensure the filter is to "Filtered HTML."
    • Replace the <your-site> placeholder below with your site URL and paste it into the block body:
<blockquote id="form-builder-field-palette">
  <ul class="form-builder-fields clearfix">
    <li class="field-textfield form-builder-palette-element form-builder-wrapper">
      XSS field
      <a href="http://<your-site>/sites/default/files/payload.txt"></a>
    </li>
  </ul>
</blockquote>

  • In "REGION SETTINGS" under "Seven (administration theme)" select "Content."
  • Click "Save block."
  1. Create the file sites/default/files/payload.txt and add this content:
{"html":"<img src=x onerror=alert(document.domain)>"}

  • Alternate option: host the JSON at an external URL and replace the <your-site> link above with that URL.
  • If using an external URL, ensure the response includes an Access-Control-Allow-Origin: * header.
  1. Go to node/add/webform.
  2. Provide a title and click "Save."
  3. Drag the "XSS field" from the block into the form.
  4. Observe an alert dialog box appear.

Addressing the Issue

Users of the affected component(s) should address this exploit in one of the following ways:

  • Strictly restrict user with access to the Form Builder graphical user interface
  • Sign up for post-EOL security support; HeroDevs customers get immediate access to a patched version of this module.

Credits

Yonatan Offek (poiu)

Vulnerability Details
ID
CVE-2026-0749
PROJECT Affected
Form Builder Drupal Module
Versions Affected
>=7.1.0 <=7.1.22
NES Versions Affected
Published date
January 15, 2026
≈ Fix date
August 27, 2025
Severity
Level
CVSS Assessment
Low
>=0 <4
Medium
>=4 <6
High
>=6 <8
Critical
>=8 <10
Medium
Category
Cross-Site Scripting
Sign up for the latest vulnerability alerts fixed in
NES for Drupal 7
Rss feed icon
Subscribe via RSS
or

By clicking “submit” I acknowledge receipt of our Privacy Policy.

Thanks for signing up for our Newsletter! We look forward to connecting with you.
Oops! Something went wrong while submitting the form.