First published: Thu Feb 13 2025(Updated: )
Lakeus is a simple skin made for MediaWiki. Starting in version 1.8.0 and prior to versions 1.3.1+REL1.39, 1.3.1+REL1.42, and 1.4.0, Lakeus is vulnerable to store cross-site scripting via malicious system messages, though editing the messages requires high privileges. Those with `(editinterface)` rights can edit system messages that are improperly handled in order to send raw HTML. In the case of `lakeus-footermessage`, this will affect all users if the server is configured to link back to this repository. Otherwise, the system messages in themeDesigner.js are only used when the user enables it in their preferences. Versions 1.3.1+REL1.39, 1.3.1+REL1.42, and 1.4.0 contain a patch.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
MediaWiki | >=1.8.0<1.3.1+REL1.39>=1.3.1+REL1.42<1.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-25287 is classified as a moderate severity vulnerability due to its potential impact on user data through cross-site scripting.
To fix CVE-2025-25287, upgrade to MediaWiki Lakeus version 1.3.1+REL1.39, 1.3.1+REL1.42, or 1.4.0.
CVE-2025-25287 affects users of MediaWiki Lakeus versions 1.8.0 through 1.3.1+REL1.39 and 1.3.1+REL1.42.
CVE-2025-25287 exploits a cross-site scripting vulnerability that can be triggered through malicious system messages.
Exploitation of CVE-2025-25287 requires high privileges to edit system messages on the MediaWiki platform.