Simple Hierarchical Select (SHS) for Drupal 7 contains cross-site scripting risk due to improper output escaping of term-derived text. Confirmed affected paths include field formatter output (shs_field_formatter_view) and term-tree child-term data generation (shs_term_get_children). Malicious taxonomy term names can be rendered unsafely depending on output context.
This affects versions from 7.x-1.0 through (and including) 7.x-1.10.

Project Subscriptions

Vendors Products
Simple Hierarchical Select (shs) Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 22 May 2026 13:30:00 +0000

Type Values Removed Values Added
References
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 22 May 2026 13:15:00 +0000

Type Values Removed Values Added
First Time appeared Drupal
Drupal simple Hierarchical Select (shs)
Vendors & Products Drupal
Drupal simple Hierarchical Select (shs)

Fri, 22 May 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-79

Thu, 21 May 2026 22:15:00 +0000

Type Values Removed Values Added
Description Simple Hierarchical Select (SHS) for Drupal 7 contains cross-site scripting risk due to improper output escaping of term-derived text. Confirmed affected paths include field formatter output (shs_field_formatter_view) and term-tree child-term data generation (shs_term_get_children). Malicious taxonomy term names can be rendered unsafely depending on output context. This affects versions from 7.x-1.0 through (and including) 7.x-1.10.
Title Simple Hierarchical Select (Drupal 7) XSS in term-derived output
References
Metrics cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: drupal

Published:

Updated: 2026-05-22T12:52:46.535Z

Reserved: 2026-03-26T19:18:14.271Z

Link: CVE-2026-4929

cve-icon Vulnrichment

Updated: 2026-05-22T12:52:08.555Z

cve-icon NVD

Status : Received

Published: 2026-05-21T22:16:48.420

Modified: 2026-05-21T22:16:48.420

Link: CVE-2026-4929

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-22T12:38:25Z

Weaknesses