First published: Thu Sep 24 2020(Updated: )
An issue was discovered in MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4. The non-jqueryMsg version of mw.message().parse() doesn't escape HTML. This affects both message contents (which are generally safe) and the parameters (which can be based on user input). (When jqueryMsg is loaded, it correctly accepts only whitelisted tags in message contents, and escapes all parameters. Situations with an unloaded jqueryMsg are rare in practice, but can for example occur for Special:SpecialPages on a wiki with no extensions installed.)
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/mediawiki/core | >=1.31.0<1.31.9>=1.34.0<1.34.3>=1.34.99<1.35.0 | |
debian/mediawiki | 1:1.31.16-1+deb10u2 1:1.31.16-1+deb10u6 1:1.35.11-1~deb11u1 1:1.35.13-1~deb11u1 1:1.39.4-1~deb12u1 1:1.39.5-1~deb12u1 1:1.39.5-1 | |
composer/mediawiki/core | >=1.35.0-rc.0<1.35.0 | 1.35.0 |
composer/mediawiki/core | >=1.32.0<1.34.3 | 1.34.3 |
composer/mediawiki/core | >=1.31.0<1.31.9 | 1.31.9 |
Wikimedia MediaWiki | >=1.32.0<1.34.4 | |
Wikimedia MediaWiki | =1.31.10 | |
Fedoraproject Fedora | =33 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-25828 has been classified as a medium severity vulnerability due to its potential for XSS attacks through unescaped HTML.
CVE-2020-25828 affects MediaWiki versions before 1.31.10 and versions between 1.32.x and 1.34.x before 1.34.4.
To fix CVE-2020-25828, update MediaWiki to version 1.31.10, 1.34.4, or a later version.
CVE-2020-25828 is a cross-site scripting (XSS) vulnerability caused by the mw.message().parse() function not escaping HTML.
There is no known workaround for CVE-2020-25828; updating to a patched version is recommended to mitigate the vulnerability.