CVE-2020-25828

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-25828
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-25828.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-25828
Aliases
Downstream
Related
Published
2020-09-27T21:15:12Z
Modified
2025-08-09T19:01:26Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

An issue was discovered in MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4. The non-jqueryMsg version of mw.message().parse() doesn't escape HTML. This affects both message contents (which are generally safe) and the parameters (which can be based on user input). (When jqueryMsg is loaded, it correctly accepts only whitelisted tags in message contents, and escapes all parameters. Situations with an unloaded jqueryMsg are rare in practice, but can for example occur for Special:SpecialPages on a wiki with no extensions installed.)

References

Affected packages

Git / github.com/wikimedia/mediawiki

Affected ranges

Type
GIT
Repo
https://github.com/wikimedia/mediawiki
Events