CVE-2025-23079
Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Wikimedia Foundation Mediawiki - ArticleFeedbackv5 extension allows Cross-Site Scripting (XSS).This issue affects Mediawiki - ArticleFeedbackv5 extension: from 1.42.X before 1.42.2.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Cross-site scripting (XSS) in MediaWiki ArticleFeedbackv5 extension due to improper input neutralization, affecting versions 1.42.X before 1.42.2.
Vulnerability
Overview
CVE-2025-23079 is a stored cross-site scripting (XSS) vulnerability in the Wikimedia Foundation's MediaWiki ArticleFeedbackv5 extension. The flaw arises from improper neutralization of user-supplied input during web page generation, allowing an attacker to inject arbitrary JavaScript into pages rendered by the extension. The issue affects all versions of the extension from 1.42.X up to (but not including) 1.42.2 [1].
Exploitation
Vectors
The vulnerability can be triggered through multiple system messages used by the extension, such as articlefeedbackv5-activity-pane-header, articlefeedbackv5-bucket?-title, and pipe-separator. An attacker can exploit these by manipulating the uselang parameter (e.g., ?uselang=x-xss) on a page with feedback enabled, or by performing a series of actions like leaving feedback, marking it as inappropriate, and requesting oversight, then refreshing the page to view the activity pane. The injected script executes in the context of the victim's browser session, bypassing the same-origin policy [1].
Impact
Successful exploitation allows an attacker to execute arbitrary JavaScript in the context of the affected MediaWiki instance. This can lead to session hijacking, defacement, theft of sensitive data (such as authentication tokens), or further attacks against other users. The CVSS v3 base score of 6.1 (Medium) reflects the need for user interaction and the requirement that the extension be enabled, but the impact on confidentiality and integrity is significant [1].
Mitigation
The vulnerability has been patched in MediaWiki ArticleFeedbackv5 version 1.42.2. Users running earlier versions should upgrade immediately. As noted in the advisory, the extension was not yet installed on Miraheze at the time of discovery, but any deployment using the affected versions is at risk. No workarounds are documented; the recommended action is to apply the update [1].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: >=1.42.0,<1.42.2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.