CVE-2025-53479
Description
The CheckUser extension’s Special:CheckUser interface is vulnerable to reflected XSS via the rev-deleted-user message. This message is rendered without proper escaping, making it possible to inject JavaScript through the uselang=x-xss language override mechanism.
This issue affects Mediawiki - CheckUser extension: from 1.42.X before 1.42.7, from 1.43.X before 1.43.2.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Reflected XSS in CheckUser's Special:CheckUser via unescaped rev-deleted-user message, exploitable through uselang=x-xss language override.
The CheckUser extension's Special:CheckUser interface is vulnerable to reflected cross-site scripting (XSS). The vulnerability resides in the rev-deleted-user message, which is rendered without proper HTML escaping. This allows an attacker to inject arbitrary JavaScript into the page by manipulating the uselang parameter to use the x-xss language, a known testing mechanism for finding unescaped messages in MediaWiki interfaces [1].
The attack requires the server to have $wgUseXssLanguage enabled, and the attacker must craft a POST request to Special:CheckUser that includes a hidden uselang=x-xss parameter. Because the form uses POST, the attacker cannot simply append a query string; instead, they must modify the HTML of the POST form to include the hidden input field [1]. The vulnerability is triggered when the form is submitted and the rev-deleted-user message is rendered in the attacker's language.
A successful exploit could allow an attacker to execute arbitrary JavaScript in the context of the victim's session. This could lead to account takeover, data theft, or other malicious actions performed with the privileges of the victim user. The risk is rated Medium (CVSS 5.4), reflecting the need for a non-default configuration and a crafted POST request [1].
The vulnerability affects CheckUser versions from 1.42.0 before 1.42.7, and from 1.43.0 before 1.43.2. Patches have been prepared and backported to the affected versions. Administrators are advised to update to the latest patched versions as soon as possible. If updating is not immediate, disabling the $wgUseXssLanguage setting may mitigate the risk, though this may impact other testing scenarios [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- Range: >=1.42.0,<1.42.7, >=1.43.0,<1.43.2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.