VYPR
Medium severity6.1NVD Advisory· Published May 11, 2026· Updated May 13, 2026

CVE-2026-34095

CVE-2026-34095

Description

Vulnerability in Wikimedia Foundation MediaWiki.

This vulnerability is associated with program files includes/Actions/ActionEntryPoint.Php, includes/Request/FauxResponse.Php.

This issue affects MediaWiki: from * before 1.43.7, 1.44.4, 1.45.2.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

MediaWiki's action=raw incorrectly returns text/html content type for JavaScript requests, potentially enabling cross-site scripting.

Vulnerability

Overview

CVE-2026-34095 is a content-type mismatch vulnerability in MediaWiki. When using the action=raw parameter with a subpage title under Special:Mypage and requesting ctype=text/javascript, the response incorrectly sets the Content-Type header to text/html instead of text/javascript [1]. This behavior originates in the includes/Actions/ActionEntryPoint.php and includes/Request/FauxResponse.php files.

Exploitation

An attacker can craft a URL that triggers this behavior, causing the browser to interpret the response as HTML. If the response contains user-controlled content (e.g., via page content or parameters), this could lead to cross-site scripting (XSS) attacks. No authentication is required to trigger the issue, as action=raw is accessible to unauthenticated users.

Impact

Successful exploitation could allow an attacker to execute arbitrary JavaScript in the context of the victim's session, potentially leading to data theft, session hijacking, or defacement. The CVSS v3 base score of 6.1 (Medium) reflects the need for user interaction and the limited scope of affected responses.

Mitigation

The vulnerability is fixed in MediaWiki versions 1.43.7, 1.44.4, and 1.45.2 [1]. Users should upgrade to these or later versions. No workarounds are documented; restricting access to action=raw may reduce risk but is not a complete solution.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.