VYPR
Medium severity5.4NVD Advisory· Published Jul 7, 2025· Updated Apr 15, 2026

CVE-2025-53478

CVE-2025-53478

Description

The CheckUser extension’s Special:Investigate interface is vulnerable to reflected XSS due to improper escaping of certain internationalized system messages rendered on the “IPs and User agents” tab.

This issue affects Mediawiki - CheckUser extension: from 1.39.X before 1.39.13, from 1.42.X before 1.42.7, from 1.43.X before 1.43.2.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Reflected XSS in CheckUser's Special:Investigate IPs/user agents tab due to insufficient escaping of i18n messages.

Vulnerability

Overview

The CheckUser extension for MediaWiki is affected by a reflected Cross-Site Scripting (XSS) vulnerability in the Special:Investigate interface, specifically within the "IPs and User agents" tab. The root cause is improper escaping of certain internationalized (i18n) system messages that are rendered on this tab [1]. This allows an attacker to inject malicious script code that executes in the context of a victim's session.

Exploitation

Prerequisites

To exploit this vulnerability, an attacker must convince a target user to visit a specially crafted URL that triggers the vulnerable interface. The attack does not require any prior authentication from the attacker, but the victim must have access to the Special:Investigate page. The manipulation occurs through crafted i18n message parameters, bypassing the expected output escaping [1].

Impact

Successful exploitation could allow the attacker to execute arbitrary JavaScript in the victim's browser. This could lead to actions such as session hijacking, data exfiltration, or performing privileged actions on behalf of the victim. The severity is rated as Medium (CVSS v3: 5.4) due to the requirement for user interaction and the need for an authenticated session to reach the vulnerable page.

Mitigation

The vulnerability affects CheckUser versions: from 1.39.X before 1.39.13, from 1.42.X before 1.42.7, and from 1.43.X before 1.43.2. Administrators should upgrade to the fixed versions listed (1.39.13, 1.42.7, 1.43.2 or later) to remediate the issue. No workarounds are mentioned in the available references [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1
  • Range: >=1.39.0, <1.39.13 || >=1.42.0, <1.42.7 || >=1.43.0, <1.43.2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.