Unrated severityNVD Advisory· Published Jan 9, 2026· Updated Jan 9, 2026
ApprovedRevs allows bypassing the inline CSS sanitizer
CVE-2026-22712
Description
Improper Encoding or Escaping of Output due to magic word replacement in ParserAfterTidy vulnerability in The Wikimedia Foundation Mediawiki - ApprovedRevs Extension allows Input Data Manipulation.This issue affects Mediawiki - ApprovedRevs Extension: 1.45, 1.44, 1.43, 1.39.
Affected products
1- Range: =1.39, =1.43, =1.44, =1.45
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.