CVE-2025-53488
Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Wikimedia Foundation Mediawiki - WikiHiero Extension allows Stored XSS.This issue affects Mediawiki - WikiHiero Extension: from 1.43.X before 1.43.2.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
WikiHiero extension stored XSS via raw HTML concatenation of system messages allows arbitrary JavaScript execution.
Vulnerability
The WikiHiero extension for MediaWiki suffers from a stored cross-site scripting (XSS) vulnerability because it concatenates the wikihiero-input and wikihiero-result system messages with raw HTML using mw.msg() and jQuery .html() [1]. The system messages are user-editable (by administrators or users with appropriate rights) and are directly inserted into the DOM without sanitization, as seen in the source code at ext.wikihiero.special.js lines 29-32 [1].
Exploitation
An attacker who can edit system messages (e.g., an administrator or a user with editinterface rights, or via a separate privilege escalation) can inject arbitrary HTML and JavaScript into the affected special page. The vulnerability is triggered when a victim visits Special:Hieroglyphs and submits any input, causing the malicious payload to execute in their browser [1].
Impact
Successful exploitation allows an attacker to execute JavaScript in the context of the victim's session, potentially leading to session hijacking, defacement, or theft of sensitive information. The attack does not require user interaction beyond visiting the page and submitting the form, making it a stored XSS with medium severity [1].
Mitigation
The vulnerability has been patched in MediaWiki WikiHiero extension versions 1.43.2 and later. Patches were merged into branches REL1_39, REL1_42, REL1_44, and master on June 10, 2025, changing the system message insertion to use .text() instead of raw HTML to prevent XSS [1]. Users should update to the latest patched version immediately.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2>=1.43.0,<1.43.2+ 1 more
- (no CPE)range: >=1.43.0,<1.43.2
- (no CPE)range: >= 1.43.0, < 1.43.2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.