VYPR
Moderate severityNVD Advisory· Published Sep 27, 2020· Updated Aug 4, 2024

CVE-2020-25812

CVE-2020-25812

Description

An issue was discovered in MediaWiki 1.34.x before 1.34.4. On Special:Contributions, the NS filter uses unescaped messages as keys in the option key for an HTMLForm specifier. This is vulnerable to a mild XSS if one of those messages is changed to include raw HTML.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

An XSS vulnerability in MediaWiki's Special:Contributions page allows attackers to inject arbitrary HTML if a message is modified to contain raw HTML.

Vulnerability

Overview

An issue in MediaWiki versions 1.34.x before 1.34.4 allowed cross-site scripting (XSS) on the Special:Contributions page. The NS filter option keys were built using unescaped messages from the invert and namespace_association system messages, as seen in the source code [1]. If an attacker could alter these messages (e.g., through editinterface rights or compromised localization), they could inject raw HTML into the page.

Exploitation

Prerequisites

Exploitation requires the ability to modify MediaWiki system messages, typically limited to administrators with editinterface permission. The XSS fires when a victim views Special:Contributions because the unescaped message values become part of the HTML form [2]. No special user interaction beyond viewing the page is needed.

Impact

An attacker can execute arbitrary HTML or JavaScript in the context of the victim's browser, potentially leading to session theft, defacement, or disclosure of sensitive information [3]. The severity is considered mild due to the administrative prerequisite, but it still poses a risk on wikis where message customization is allowed.

Mitigation

The fix replaces ->text() with ->escaped() when generating the option keys, ensuring proper HTML escaping [2]. The vulnerability is addressed in MediaWiki 1.34.4 and later releases; administrators should upgrade or apply the patch [4].

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
mediawiki/corePackagist
>= 1.34.0, < 1.34.31.34.3
mediawiki/corePackagist
>= 1.35.0-rc.0, < 1.35.01.35.0

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

9

News mentions

0

No linked articles in our index yet.