CVE-2025-67475

N/A Unknown

📋 TL;DR

This CVE describes a cross-site scripting (XSS) vulnerability in MediaWiki's CommentFormatter/CommentParser.php that allows attackers to inject malicious scripts into web pages. The vulnerability affects MediaWiki installations running affected versions, potentially compromising user sessions and data. Users of vulnerable MediaWiki instances are at risk of having their browsers execute unauthorized code.

💻 Affected Systems

Products:
  • Wikimedia Foundation MediaWiki
Versions: MediaWiki versions before 1.39.16, 1.43.6, 1.44.3, 1.45.1
Operating Systems: All operating systems running MediaWiki
Default Config Vulnerable: ⚠️ Yes
Notes: All MediaWiki installations using the affected CommentFormatter/CommentParser.php component are vulnerable regardless of configuration.

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, deface wikis, install malware on visitor browsers, or pivot to internal network attacks through compromised admin accounts.

🟠

Likely Case

Attackers inject malicious JavaScript to steal user session cookies, redirect users to phishing sites, or perform actions on behalf of authenticated users.

🟢

If Mitigated

With proper input validation and output encoding, the impact is limited to potential script execution in specific contexts, but modern browsers' XSS protections might block some attacks.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

XSS vulnerabilities typically have low exploitation complexity, though specific exploit details for this CVE aren't publicly documented.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: MediaWiki 1.39.16, 1.43.6, 1.44.3, 1.45.1 or later

Vendor Advisory: https://phabricator.wikimedia.org/T406664

Restart Required: No

Instructions:

1. Backup your MediaWiki installation and database. 2. Download the patched version from mediawiki.org. 3. Replace affected files with patched versions. 4. Run update.php if database schema changes are required.

🔧 Temporary Workarounds

Input Sanitization Enhancement

all

Implement additional input validation and output encoding for comment fields

# Modify LocalSettings.php to add custom sanitization rules
# Implement Content-Security-Policy headers

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers to limit script execution
  • Deploy web application firewall (WAF) rules specifically blocking XSS payloads in comment fields

🔍 How to Verify

Check if Vulnerable:

Check MediaWiki version and compare against affected versions. Review if includes/CommentFormatter/CommentParser.php exists in installation.

Check Version:

php maintenance/run.php includes/Version.php | grep 'MediaWiki'

Verify Fix Applied:

Verify MediaWiki version is 1.39.16, 1.43.6, 1.44.3, 1.45.1 or later. Test comment functionality with XSS payloads.

📡 Detection & Monitoring

Log Indicators:

  • Unusual comment submissions with script tags or JavaScript code
  • Multiple failed comment submissions with encoded payloads

Network Indicators:

  • HTTP requests containing script tags in comment parameters
  • Unusual outbound connections from MediaWiki server after comment submissions

SIEM Query:

source="mediawiki_access.log" AND ("<script" OR "javascript:" OR "onload=" OR "onerror=")

🔗 References

📤 Share This