Overview
The CVE-2025-8092 vulnerability pertains to an improper neutralization of input during web page generation, also known as ‘Cross-site Scripting’ (XSS), in Drupal’s COOKiES Consent Management. This presents a significant security risk to all versions of Drupal COOKiES Consent Management prior to 1.2.16. An exploit of this vulnerability could potentially compromise the system or lead to data leakage.
Vulnerability Summary
CVE ID: CVE-2025-8092
Severity: High – 7.6 (CVSS Score)
Attack Vector: Web-based
Privileges Required: None
User Interaction: Required
Impact: Potential system compromise or data leakage
Affected Products
Escape the Surveillance Era
Most apps won’t tell you the truth.
They’re part of the problem.
Phone numbers. Emails. Profiles. Logs.
It’s all fuel for surveillance.
Ameeba Chat gives you a way out.
- • No phone number
- • No email
- • No personal info
- • Anonymous aliases
- • End-to-end encrypted
Chat without a trace.
Product | Affected Versions
Drupal COOKiES Consent Management | 0.0.0 to 1.2.15
How the Exploit Works
The vulnerability is a result of improper input sanitization during web page generation. This allows an attacker to inject malicious scripts that can be executed in the victim’s browser when they visit the affected web page. This script can access sensitive information like session cookies, perform actions on behalf of the user or modify the appearance of the page.
Conceptual Example Code
The vulnerability might be exploited with a malicious HTTP request like this:
POST /cookies/consent HTTP/1.1
Host: target.example.com
Content-Type: application/json
{ "consent": "<script>malicious_code_here</script>" }
The `consent` parameter is where the attacker would insert their malicious script. When this request is processed by the server, the script will be inserted into the web page sent to the user’s browser, where it will be executed.

