VYPR
Medium severityNVD Advisory· Published Oct 17, 2025· Updated Apr 29, 2026

CVE-2025-62652

CVE-2025-62652

Description

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in The Wikimedia Foundation MediaWiki WebAuthn extension allows Stored XSS.This issue affects MediaWiki WebAuthn extension: 1.39, 1.43, 1.44.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored XSS in MediaWiki WebAuthn extension allows attackers to inject arbitrary JavaScript via the key name field, affecting versions 1.39, 1.43, and 1.44.

Vulnerability

CVE-2025-62652 is a stored cross-site scripting (XSS) vulnerability in the MediaWiki WebAuthn extension, affecting versions 1.39, 1.43, and 1.44. The root cause is improper neutralization of user input during the WebAuthn key registration process. When a user sets up a WebAuthn key, the name provided for the key is not sanitized, allowing arbitrary HTML and JavaScript to be stored and later executed [1].

Exploitation

To exploit this vulnerability, an attacker must have an account on the wiki that does not have two-factor authentication (2FA) enabled. During the WebAuthn key setup, the attacker enters a malicious payload (e.g., oops) as the key name. After completing the setup, the payload is stored and executed every time the victim visits the Special:AccountSecurity page, where the key name is displayed without propertly rendered without sanitization [1].

ImpactAn attacker can execute arbitrary

JavaScript in the context of the victim's session on the Special:AccountSecurity page. While the page normally disables user scripts, this XSS bypasses that restriction, potentially allowing the attacker to perform actions on behalf of the victim, such as modifying security settings or exfiltrating data. The attack requires user interaction during the key setup phase, but the stored payload triggers automatically on subsequent page loads [1].

MitigationThe vulnerability has been fixed in the MediaWiki WebAuthn extension. Users should update to the latest patched version. No workaround is available other than disabling the extension. The issue is publicly disclosed and tracked in the Wikimedia Phabricator as task T403093 [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.