CVE-2025-62652
Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in The Wikimedia Foundation MediaWiki WebAuthn extension allows Stored XSS.This issue affects MediaWiki WebAuthn extension: 1.39, 1.43, 1.44.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Stored XSS in MediaWiki WebAuthn extension allows attackers to inject arbitrary JavaScript via the key name field, affecting versions 1.39, 1.43, and 1.44.
Vulnerability
CVE-2025-62652 is a stored cross-site scripting (XSS) vulnerability in the MediaWiki WebAuthn extension, affecting versions 1.39, 1.43, and 1.44. The root cause is improper neutralization of user input during the WebAuthn key registration process. When a user sets up a WebAuthn key, the name provided for the key is not sanitized, allowing arbitrary HTML and JavaScript to be stored and later executed [1].
Exploitation
To exploit this vulnerability, an attacker must have an account on the wiki that does not have two-factor authentication (2FA) enabled. During the WebAuthn key setup, the attacker enters a malicious payload (e.g., oops) as the key name. After completing the setup, the payload is stored and executed every time the victim visits the Special:AccountSecurity page, where the key name is displayed without propertly rendered without sanitization [1].
ImpactAn attacker can execute arbitrary
JavaScript in the context of the victim's session on the Special:AccountSecurity page. While the page normally disables user scripts, this XSS bypasses that restriction, potentially allowing the attacker to perform actions on behalf of the victim, such as modifying security settings or exfiltrating data. The attack requires user interaction during the key setup phase, but the stored payload triggers automatically on subsequent page loads [1].
MitigationThe vulnerability has been fixed in the MediaWiki WebAuthn extension. Users should update to the latest patched version. No workaround is available other than disabling the extension. The issue is publicly disclosed and tracked in the Wikimedia Phabricator as task T403093 [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
21.39, 1.43, 1.44+ 1 more
- (no CPE)range: 1.39, 1.43, 1.44
- (no CPE)range: = 1.39, 1.43, 1.44
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.