First published: Mon Dec 21 2020(Updated: )
An issue was discovered in the Widgets extension for MediaWiki through 1.35.1. Any user with the ability to edit pages within the Widgets namespace could call any static function within any class (defined within PHP or MediaWiki) via a crafted HTML comment, related to a Smarty template. For example, a person in the Widget Editors group could use \MediaWiki\Shell\Shell::command within a comment.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MediaWiki | <=1.35.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-35625 has a medium severity rating due to its potential for allowing unauthorized access to execute static functions.
To fix CVE-2020-35625, upgrade MediaWiki to version 1.35.2 or later, which addresses the vulnerability.
Any user with edit permissions in the Widgets namespace of MediaWiki versions up to and including 1.35.1 is affected by CVE-2020-35625.
CVE-2020-35625 is a code execution vulnerability that can be exploited via crafted HTML comments.
No, if you have updated your MediaWiki to version 1.35.2 or later, CVE-2020-35625 is no longer a risk.