Description Preview
Overview
This vulnerability (CWE-79: Cross-site Scripting) allows attackers to inject malicious client-side scripts into MediaWiki instances through specially crafted URLs targeting the Upload Image functionality. Since this is a blind stored XSS, the attacker may not immediately see the execution of their payload, but it remains persistent in the system and can execute when administrators or other users access affected pages. This could lead to session hijacking, credential theft, or other client-side attacks against MediaWiki users with elevated privileges.
Remediation
To address this vulnerability, administrators should update their MediaWiki installations to the following patched versions:
- Version 1.35.5 or later if using the 1.35.x branch
- Version 1.36.3 or later if using the 1.36.x branch
- Version 1.37.1 or later if using the 1.37.x branch
If immediate updates are not possible, consider implementing additional security controls such as:
- Restricting upload permissions to trusted users only
- Implementing Content Security Policy (CSP) headers to mitigate XSS attacks
- Regularly monitoring upload logs for suspicious activity
References
- Wikimedia Phabricator Issue Tracker: https://phabricator.wikimedia.org/T293589
- Gentoo Linux Security Advisory: https://security.gentoo.org/glsa/202305-24
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Industry ExposureMost to leastThis section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.
- ManufacturingManufacturing
- Professional, Scientific, & Technical ServicesProfessional, Scientific, & Technical Services
- Public AdministrationPublic Administration
- Accommodation & Food ServicesAccommodation & Food Services
- Administrative, Support, Waste Management & Remediation ServicesAdministrative, Support, Waste Management & Remediation Services
- Agriculture, Forestry Fishing & HuntingAgriculture, Forestry Fishing & Hunting
- Arts, Entertainment & RecreationArts, Entertainment & Recreation
- ConstructionConstruction
- Educational ServicesEducational Services
- Finance and InsuranceFinance and Insurance
- Health Care & Social AssistanceHealth Care & Social Assistance
- InformationInformation
- Management of Companies & EnterprisesManagement of Companies & Enterprises
- MiningMining
- Other Services (except Public Administration)Other Services (except Public Administration)
- Real Estate Rental & LeasingReal Estate Rental & Leasing
- Retail TradeRetail Trade
- Transportation & WarehousingTransportation & Warehousing
- UtilitiesUtilities
- Wholesale TradeWholesale Trade