CVE-2025-10354
Description
Cross-Site Scripting (XSS) vulnerability reflected in Semantic MediaWiki. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending them a malicious URL using the '/index.php/Speciaal:GefacetteerdZoeken' endpoint parameter. This vulnerability can be exploited to steal sensitive user data, such as session cookies, or to perform actions on behalf of the user.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A reflected XSS vulnerability in Semantic MediaWiki allows attackers to execute JavaScript via a malicious URL, potentially stealing session cookies.
Vulnerability
Overview CVE-2025-10354 is a reflected Cross-Site Scripting (XSS) vulnerability in the Semantic MediaWiki extension for MediaWiki. The flaw exists in the /index.php/Speciaal:GefacetteerdZoeken endpoint, where user-supplied input is not properly sanitized before being reflected in the page output. This allows an attacker to inject arbitrary JavaScript code into the response [1].
Exploitation
An attacker can exploit this vulnerability by crafting a malicious URL containing the XSS payload in the endpoint parameter. When a victim clicks on the link (e.g., via phishing or social engineering), the injected script executes in the context of the victim's browser session. No authentication is required to trigger the vulnerability, but user interaction is necessary [1].
Impact
Successful exploitation enables the attacker to execute arbitrary JavaScript in the victim's browser. This can be used to steal sensitive information such as session cookies, perform actions on behalf of the authenticated user, or deface the wiki page. The CVSS v4.0 base score is 5.1 (Medium), reflecting the need for user interaction and the limited scope of impact [1].
Mitigation
The Semantic MediaWiki team has addressed this vulnerability in version 5.0.2. Users running versions prior to 5.0.2 are advised to upgrade immediately. No workarounds have been provided, and the vulnerability is not known to be exploited in the wild [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.