VYPR
Medium severity5.4NVD Advisory· Published Jul 7, 2025· Updated Apr 15, 2026

CVE-2025-53486

CVE-2025-53486

Description

The WikiCategoryTagCloud extension is vulnerable to reflected XSS via the linkstyle attribute, which is improperly concatenated into inline HTML without escaping. An attacker can inject JavaScript event handlers such as onmouseenter using carefully crafted input via the {{#tag:tagcloud}} parser function, resulting in arbitrary JavaScript execution when a victim hovers over a link in the category cloud.

The vulnerability exists because the linkstyle parameter is only passed through Sanitizer::checkCss() (which does not escape HTML) and is then directly inserted into a style attribute using string concatenation instead of Html::element or Html::openElement.

This issue affects Mediawiki - WikiCategoryTagCloud extension: from 1.39.X before 1.39.13, from 1.42.X before 1.42.7, from 1.43.X before 1.43.2.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Reflected XSS in MediaWiki WikiCategoryTagCloud extension via unsanitized linkstyle attribute allows arbitrary JavaScript execution on hover.

The WikiCategoryTagCloud extension for MediaWiki is vulnerable to reflected cross-site scripting (XSS) through the linkstyle parameter of the {{#tag:tagcloud}} parser function. The vulnerability arises because the linkstyle value is only passed through Sanitizer::checkCss(), which checks for dangerous CSS functions like url() but does not escape HTML entities. The value is then concatenated directly into an inline style attribute using string concatenation, rather than being safely inserted via Html::element or Html::openElement. This allows an attacker to break out of the attribute and inject arbitrary HTML attributes, such as JavaScript event handlers [1].

To exploit this vulnerability, an attacker crafts a wiki page or uses Special:ExpandTemplates with a {{#tag:tagcloud}} call containing a malicious linkstyle value, for example: linkstyle=""onmouseenter="alert('XSS')"". When a victim hovers over any link in the generated category cloud, the injected onmouseenter event handler executes arbitrary JavaScript in the context of the victim's session. The attack requires no special privileges; any user who can view the page can be targeted. The {{#tag:}} parser function allows quotes to be inserted into parameters, bypassing typical restrictions that apply when using extension tags via attributes [1].

The impact is reflected XSS, enabling an attacker to perform actions on behalf of the victim, such as stealing session cookies, modifying page content, or performing administrative actions if the victim has elevated rights. The vulnerability affects WikiCategoryTagCloud versions 1.39.x before 1.39.13, 1.42.x before 1.42.7, and 1.43.x before 1.43.2. Patched versions are available; users should update to the latest release. No workaround is documented, but disabling the extension or restricting its use to trusted editors may reduce risk [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.