Vulnerabilites related to Wikimedia Foundation - Mediawiki - ApprovedRevs extension
CVE-2025-53487 (GCVE-0-2025-53487)
Vulnerability from cvelistv5
Published
2025-07-07 15:13
Modified
2025-07-07 19:16
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')
Summary
The ApprovedRevs extension for MediaWiki is vulnerable to stored XSS in multiple locations where system messages are inserted into raw HTML without proper escaping. Attackers can exploit this by injecting JavaScript payloads via the uselang=x-xss language override, which causes crafted message keys to be rendered unescaped.
This issue affects Mediawiki - ApprovedRevs extension: from 1.39.X before 1.39.13, from 1.42.X before 1.42.7, from 1.43.X before 1.43.2.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Wikimedia Foundation | Mediawiki - ApprovedRevs extension |
Version: 1.39.x ≤ Version: 1.42.x ≤ Version: 1.43.x ≤ |
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2025-53487", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-07-07T19:15:46.401420Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-07T19:16:14.015Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Mediawiki - ApprovedRevs extension", "vendor": "Wikimedia Foundation", "versions": [ { "lessThan": "1.39.13", "status": "affected", "version": "1.39.x", "versionType": "semver" }, { "lessThan": "1.42.7", "status": "affected", "version": "1.42.x", "versionType": "semver" }, { "lessThan": "1.43.2", "status": "affected", "version": "1.43.x", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eThe ApprovedRevs extension for MediaWiki is vulnerable to \u003cb\u003estored XSS\u003c/b\u003e in multiple locations where system messages are inserted into raw HTML without proper escaping. Attackers can exploit this by injecting JavaScript payloads via the uselang=x-xss language override, which causes crafted message keys to be rendered unescaped.\u003c/p\u003e\n\n\n\u003cp\u003eThis issue affects Mediawiki - ApprovedRevs extension: from 1.39.X before 1.39.13, from 1.42.X before 1.42.7, from 1.43.X before 1.43.2.\u003c/p\u003e" } ], "value": "The ApprovedRevs extension for MediaWiki is vulnerable to stored XSS in multiple locations where system messages are inserted into raw HTML without proper escaping. Attackers can exploit this by injecting JavaScript payloads via the uselang=x-xss language override, which causes crafted message keys to be rendered unescaped.\n\n\n\n\nThis issue affects Mediawiki - ApprovedRevs extension: from 1.39.X before 1.39.13, from 1.42.X before 1.42.7, from 1.43.X before 1.43.2." } ], "impacts": [ { "capecId": "CAPEC-592", "descriptions": [ { "lang": "en", "value": "CAPEC-592 Stored XSS" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-07T15:13:38.574Z", "orgId": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc", "shortName": "wikimedia-foundation" }, "references": [ { "url": "https://phabricator.wikimedia.org/T394383" }, { "url": "https://gerrit.wikimedia.org/r/q/Ifcab085111e7898da485a5e2ae287fee4e6d167b" } ], "source": { "discovery": "UNKNOWN" }, "title": "ApprovedRevs: Stored Cross-Site Scripting (XSS) via unsanitized system messages", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc", "assignerShortName": "wikimedia-foundation", "cveId": "CVE-2025-53487", "datePublished": "2025-07-07T15:13:38.574Z", "dateReserved": "2025-06-30T15:20:44.462Z", "dateUpdated": "2025-07-07T19:16:14.015Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }