CVE-2025-23072

5.4 MEDIUM

📋 TL;DR

This CVE describes a cross-site scripting (XSS) vulnerability in the MediaWiki RefreshSpecial extension. It allows attackers to inject malicious scripts into web pages, potentially compromising user sessions or stealing sensitive data. Affected users include anyone running vulnerable versions of MediaWiki with the RefreshSpecial extension enabled.

💻 Affected Systems

Products:
  • Wikimedia Foundation Mediawiki - RefreshSpecial Extension
Versions: MediaWiki versions: 1.39.X before 1.39.11, 1.41.X before 1.41.3, 1.42.X before 1.42.2
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations with the RefreshSpecial extension enabled.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, deface websites, or redirect users to malicious sites, potentially leading to complete system compromise.

🟠

Likely Case

Session hijacking, cookie theft, or credential harvesting from users who visit maliciously crafted pages.

🟢

If Mitigated

Limited impact with proper Content Security Policy (CSP) headers and input validation, though XSS could still execute in some contexts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

XSS vulnerabilities typically have low exploitation complexity, especially when unauthenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: MediaWiki 1.39.11, 1.41.3, or 1.42.2

Vendor Advisory: https://phabricator.wikimedia.org/T378885

Restart Required: No

Instructions:

1. Update MediaWiki to the patched version. 2. Verify the RefreshSpecial extension is updated. 3. Clear caches if necessary.

🔧 Temporary Workarounds

Disable RefreshSpecial Extension

all

Temporarily disable the vulnerable extension until patching is possible.

Edit LocalSettings.php and remove or comment out: wfLoadExtension('RefreshSpecial');

Implement Content Security Policy

all

Add CSP headers to mitigate XSS impact by restricting script execution sources.

Add to web server config or .htaccess: Header set Content-Security-Policy "default-src 'self'; script-src 'self'"
For Apache: Header always set Content-Security-Policy "default-src 'self'"
For Nginx: add_header Content-Security-Policy "default-src 'self';";

🧯 If You Can't Patch

  • Disable the RefreshSpecial extension immediately.
  • Implement strict input validation and output encoding for all user inputs in custom code.

🔍 How to Verify

Check if Vulnerable:

Check MediaWiki version and extension status via Special:Version page or by examining LocalSettings.php for wfLoadExtension('RefreshSpecial').

Check Version:

php maintenance/run.php --version (CLI) or check Special:Version page.

Verify Fix Applied:

Confirm MediaWiki version is 1.39.11, 1.41.3, or 1.42.2 or higher, and verify the extension is enabled only in patched versions.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST/GET requests to RefreshSpecial pages with script tags or JavaScript payloads in parameters.
  • Error logs showing malformed input or script execution attempts.

Network Indicators:

  • HTTP requests containing suspicious script tags or encoded JavaScript in query strings or POST data.

SIEM Query:

source="*access.log*" AND (uri_path="*RefreshSpecial*" AND (query="*<script>*" OR query="*javascript:*"))

🔗 References

📤 Share & Export