CVE-2025-67481
📋 TL;DR
This is a cross-site scripting (XSS) vulnerability in MediaWiki's jQueryMsg JavaScript library that allows attackers to inject malicious scripts into web pages. It affects MediaWiki instances running vulnerable versions, potentially compromising users who view specially crafted content. The vulnerability exists in the client-side JavaScript processing of messages.
💻 Affected Systems
- Wikimedia Foundation MediaWiki
⚠️ Risk & Real-World Impact
Worst Case
Attackers could steal user sessions, perform actions on behalf of users, deface pages, or redirect users to malicious sites by injecting arbitrary JavaScript that executes in victims' browsers.
Likely Case
Targeted attacks against specific users through crafted messages or page content, potentially leading to session hijacking or credential theft.
If Mitigated
With proper Content Security Policy (CSP) headers and input validation, impact is reduced to limited script execution within CSP constraints.
🎯 Exploit Status
XSS vulnerabilities typically have low exploitation complexity. The vulnerability is in client-side JavaScript, making exploitation straightforward once the attack vector is identified.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: MediaWiki 1.39.16, 1.43.6, 1.44.3, or 1.45.1
Vendor Advisory: https://phabricator.wikimedia.org/T251032
Restart Required: No
Instructions:
1. Backup your MediaWiki installation. 2. Update MediaWiki to version 1.39.16, 1.43.6, 1.44.3, or 1.45.1 depending on your branch. 3. Clear browser caches and MediaWiki caches. 4. Verify the update completed successfully.
🔧 Temporary Workarounds
Content Security Policy (CSP)
allImplement strict CSP headers to limit script execution sources and reduce XSS impact
Input Validation Filter
allAdd additional input validation for user-generated content that passes through jQueryMsg
🧯 If You Can't Patch
- Implement strict Content Security Policy headers with script-src directives
- Disable or limit user-generated content features that use the vulnerable jQueryMsg library
🔍 How to Verify
Check if Vulnerable:
Check MediaWiki version in LocalSettings.php or via Special:Version page. Compare against affected versions.
Check Version:
grep 'wgVersion' LocalSettings.php or visit Special:Version
Verify Fix Applied:
Verify version is 1.39.16, 1.43.6, 1.44.3, or 1.45.1 or higher. Test message parsing functionality.
📡 Detection & Monitoring
Log Indicators:
- Unusual JavaScript in page content
- Multiple failed message parsing attempts
- Suspicious user agent strings
Network Indicators:
- Script tags in unexpected parameters
- Unusual POST/GET requests to message-related endpoints
SIEM Query:
source="mediawiki" AND (message="jquerymsg" OR message="script injection")