-
CVSS Score
-A Semantic Attack on Google Gemini - Read the Latest Research
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| drupal/google_tag | composer | < 1.8.0 | 1.8.0 |
| drupal/google_tag | composer | >= 2.0.0, < 2.0.8 | 2.0.8 |
The vulnerability stems from two key points: 1) Improper access control on the admin permission allowed untrusted users to modify container settings, and 2) The container ID/output handling functions lacked proper neutralization. The google_tag_page_attachments function is critical as it directly outputs user-controlled container IDs into page scripts. The SettingsForm submit handler enables injection through insufficient input validation. These functions would appear in exploit stack traces during both configuration modification (submitForm) and malicious script execution (page_attachments).