CVE-2025-7362
Description
The MsUpload extension for MediaWiki is vulnerable to stored XSS via the msu-continue system message, which is inserted into the DOM without proper sanitization. The vulnerability occurs in the file upload UI when the same filename is uploaded twice.
This issue affects Mediawiki - MsUpload extension: from 1.39.X before 1.39.13, from 1.42.X before 1.42.7, from 1.43.X before 1.43.2.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Stored XSS in MediaWiki MsUpload extension via unsanitized msu-continue message.
The MsUpload extension for MediaWiki is vulnerable to stored cross-site scripting (XSS) through the msu-continue system message. This message is retrieved using mw.msg() in text mode and directly appended to the DOM via jQuery's .append() method without any sanitization [1]. As a result, an attacker can inject arbitrary HTML and JavaScript into the file upload interface.
To exploit the vulnerability, an attacker must have the ability to edit a page on the wiki. The attack requires the wiki to have the WikiEditor and MsUpload extensions enabled, and the parameter uselang=x-xss must be present in the edit URL to access the XSS language variant. Then, the attacker drags a file with the same name as an already-uploaded file into the drop zone. Alternatively, an attacker with the ability to edit the MediaWiki system message MediaWiki:Msu-continue can directly inject malicious script into that message [1].
Successful exploitation allows the attacker to execute arbitrary JavaScript in the context of any user who uploads a file with a duplicate name. This can lead to session hijacking, defacement, or theft of sensitive data.
The vulnerability affects MsUpload extension versions from 1.39.X before 1.39.13, from 1.42.X before 1.42.7, and from 1.43.X before 1.43.2. Patches are available in the referenced Phabricator task [1]. Administrators should update the extension to the latest version or restrict editing of system messages to trusted users.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: >=1.39.0,<1.39.13 || >=1.42.0,<1.42.7 || >=1.43.0,<1.43.2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.