First published: Thu Sep 24 2020(Updated: )
In MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4, XSS related to jQuery can occur. The attacker creates a message with [javascript:payload xss] and turns it into a jQuery object with mw.message().parse(). The expected result is that the jQuery object does not contain an <a> tag (or it does not have a href attribute, or it's empty, etc.). The actual result is that the object contains an <a href ="javascript... that executes when clicked.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/mediawiki/core | >=1.31.0<1.31.9>=1.34.0<1.34.3>=1.34.99<1.35.0 | |
debian/mediawiki | 1:1.31.16-1+deb10u2 1:1.31.16-1+deb10u6 1:1.35.11-1~deb11u1 1:1.35.13-1~deb11u1 1:1.39.4-1~deb12u1 1:1.39.5-1~deb12u1 1:1.39.5-1 | |
composer/mediawiki/core | >=1.35.0-rc.0<1.35.0 | 1.35.0 |
composer/mediawiki/core | >=1.32.0<1.34.3 | 1.34.3 |
composer/mediawiki/core | >=1.31.0<1.31.9 | 1.31.9 |
Wikimedia MediaWiki | <1.31.10 | |
Wikimedia MediaWiki | >=1.32.0<1.34.4 | |
Fedoraproject Fedora | =33 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-25814 has a medium severity rating due to its ability to enable XSS attacks via jQuery.
To fix CVE-2020-25814, upgrade MediaWiki to version 1.31.10, 1.34.4, or later versions.
CVE-2020-25814 affects MediaWiki versions before 1.31.10 and between 1.32.x and 1.34.x prior to 1.34.4.
CVE-2020-25814 is an XSS (Cross-Site Scripting) vulnerability related to jQuery parsing.
CVE-2020-25814 allows attackers to inject malicious scripts into user-facing pages, potentially leading to unauthorized actions on behalf of users.