CVE-2020-25814
Description
In MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4, XSS related to jQuery can occur. The attacker creates a message with [javascript:payload xss] and turns it into a jQuery object with mw.message().parse(). The expected result is that the jQuery object does not contain an tag (or it does not have a href attribute, or it's empty, etc.). The actual result is that the object contains an <a href ="javascript... that executes when clicked.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
MediaWiki before 1.31.10 and 1.32–1.34.x before 1.34.4 contains a stored XSS vulnerability via jQuery object unsanitized href attributes.
Vulnerability
Overview
CVE-2020-25814 is a cross-site scripting (XSS) vulnerability in MediaWiki versions prior to 1.31.10 and 1.32.x through 1.34.x before 1.34.4. The flaw resides in the mediawiki.jqueryMsg module, specifically when processing messages with mw.message().parse(). An attacker can craft a message containing a [javascript:payload xss] link, which is then converted into a jQuery object. Due to insufficient sanitization, the resulting ` tag retains the javascript:` href, executing arbitrary JavaScript when clicked by a victim.[1][2]
Exploitation
Details
An authenticated attacker (or one able to influence a wiki page's message content) can insert a specially crafted wikitext link with a javascript: URI. When MediaWiki's message parser processes this input through mw.message().parse(), it fails to strip or neutralize the dangerous scheme. The output is a jQuery object containing an `` element. Any user interacting with this rendered content—by clicking the resulting link—triggers script execution in their browser session. No special privileges beyond the ability to edit or create pages with such messages are required.[2][3]
Impact
Successful exploitation allows an attacker to execute arbitrary JavaScript in the context of the victim's MediaWiki session. This can lead to session hijacking, defacement, data theft, or performing administrative actions on behalf of the victim. Since the injected script runs with the user's privileges, the impact scales with the victim's permissions, potentially compromising the entire wiki instance.[2]
Mitigation
The vulnerability is fixed in MediaWiki 1.31.10 and 1.34.4. The fix involves sanitizing URLs and the style attribute in the mediawiki.jqueryMsg module. Administrators are strongly advised to upgrade to these patched versions immediately. No workarounds are publicly documented; upgrading is the only secure mitigation.[3][4]
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
mediawiki/corePackagist | >= 1.31.0, < 1.31.9 | 1.31.9 |
mediawiki/corePackagist | >= 1.32.0, < 1.34.3 | 1.34.3 |
mediawiki/corePackagist | >= 1.35.0-rc.0, < 1.35.0 | 1.35.0 |
Affected products
2- osv-coords2 versions
< 1.31.10+ 1 more
- (no CPE)range: < 1.31.10
- (no CPE)range: >= 1.31.0, < 1.31.9
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- github.com/advisories/GHSA-4vr7-m8p8-434hghsaADVISORY
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RTTPZ7XMDS66I442OLLHXBDNP2LCBJU6/mitrevendor-advisoryx_refsource_FEDORA
- nvd.nist.gov/vuln/detail/CVE-2020-25814ghsaADVISORY
- github.com/FriendsOfPHP/security-advisories/blob/master/mediawiki/core/CVE-2020-25814.yamlghsaWEB
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RTTPZ7XMDS66I442OLLHXBDNP2LCBJU6ghsaWEB
- lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.htmlghsax_refsource_CONFIRMWEB
- lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.htmlghsax_refsource_MISCWEB
- phabricator.wikimedia.org/T86738ghsaWEB
- www.mediawiki.org/wiki/ResourceLoader/Core_modulesghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.