Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-4929
PUBLISHED
More InfoOfficial Page
Assigner-drupal
Assigner Org ID-2c85b837-eb8b-40ed-9d74-228c62987387
View Known Exploited Vulnerability (KEV) details
Published At-21 May, 2026 | 21:48
Updated At-22 May, 2026 | 12:52
Rejected At-
▼CVE Numbering Authority (CNA)
Simple Hierarchical Select (Drupal 7) XSS in term-derived output

Simple Hierarchical Select (SHS) for Drupal 7 contains cross-site scripting risk due to improper output escaping of term-derived text. Confirmed affected paths include field formatter output (shs_field_formatter_view) and term-tree child-term data generation (shs_term_get_children). Malicious taxonomy term names can be rendered unsafely depending on output context. This affects versions from 7.x-1.0 through (and including) 7.x-1.10.

Affected Products
Vendor
The Drupal AssociationDrupal
Product
Simple Hierarchical Select (shs)
Collection URL
https://www.drupal.org/project/shs
Repo
https://git.drupalcode.org/project/shs
Default Status
unknown
Versions
Affected
  • From 7.x-1.0 before 7.x-1.11 (custom)
Problem Types
TypeCWE IDDescription
CWECross-siteCross-site Scripting (XSS)
Type: CWE
CWE ID: Cross-site
Description: Cross-site Scripting (XSS)
Metrics
VersionBase scoreBase severityVector
4.05.1MEDIUM
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N
Version: 4.0
Base score: 5.1
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

finder
Reporter: Ra Mänd (ram4nd)
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.herodevs.com/vulnerability-directory/cve-2026-4929
third-party-advisory
https://d7es.tag1.com/security-advisories/simple-hierarchical-select-moderately-critical-cross-site-scripting
third-party-advisory
Hyperlink: https://www.herodevs.com/vulnerability-directory/cve-2026-4929
Resource:
third-party-advisory
Hyperlink: https://d7es.tag1.com/security-advisories/simple-hierarchical-select-moderately-critical-cross-site-scripting
Resource:
third-party-advisory
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Problem Types
TypeCWE IDDescription
CWECWE-79CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Type: CWE
CWE ID: CWE-79
Description: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.herodevs.com/vulnerability-directory/cve-2026-4929?nes-for-drupal-7
exploit
Hyperlink: https://www.herodevs.com/vulnerability-directory/cve-2026-4929?nes-for-drupal-7
Resource:
exploit
Details not found