CVE-2025-32069

5.4 MEDIUM

📋 TL;DR

This CVE describes a cross-site scripting (XSS) vulnerability in the Mediawiki Wikibase Media Info Extension caused by improper input validation. Attackers can inject malicious scripts that execute in users' browsers when they view specially crafted content. This affects Mediawiki installations using the Wikibase Media Info Extension versions 1.39 through 1.43.

💻 Affected Systems

Products:
  • Mediawiki - Wikibase Media Info Extension
Versions: from 1.39 through 1.43
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Mediawiki installations with the Wikibase Media Info Extension enabled. Core Mediawiki is not affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, perform actions as authenticated users, deface pages, or redirect users to malicious sites, potentially compromising user accounts and sensitive data.

🟠

Likely Case

Attackers inject malicious JavaScript to steal session cookies or perform limited actions in the context of logged-in users viewing affected pages.

🟢

If Mitigated

With proper Content Security Policy (CSP) headers and input sanitization, impact is reduced to limited script execution within the page context.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

XSS vulnerabilities typically have low exploitation complexity. The vulnerability allows unauthenticated attackers to inject scripts that execute when users view affected content.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.43.1 or later

Vendor Advisory: https://phabricator.wikimedia.org/T387691

Restart Required: No

Instructions:

1. Update the Wikibase Media Info Extension to version 1.43.1 or later. 2. For Mediawiki 1.39-1.42, apply the patch from the gerrit reference. 3. Clear any caches. 4. Verify the fix by testing input validation.

🔧 Temporary Workarounds

Implement Content Security Policy

all

Add CSP headers to restrict script execution sources and mitigate XSS impact

Add to web server config or Mediawiki LocalSettings.php: Header set Content-Security-Policy "default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval';"
Consider implementing stricter CSP policies based on your needs

Disable Wikibase Media Info Extension

all

Temporarily disable the vulnerable extension until patching is possible

Edit LocalSettings.php and comment out or remove: wfLoadExtension('WikibaseMediaInfo');
Restart web server if required

🧯 If You Can't Patch

  • Implement strict Content Security Policy headers to limit script execution
  • Enable Mediawiki's built-in XSS protection features and review user input validation

🔍 How to Verify

Check if Vulnerable:

Check the Wikibase Media Info Extension version in Mediawiki's Special:Version page or extension directory

Check Version:

Check Mediawiki Special:Version page or examine extension.json in extensions/WikibaseMediaInfo/

Verify Fix Applied:

Test input fields that previously accepted script tags - they should now be properly sanitized

📡 Detection & Monitoring

Log Indicators:

  • Unusual script tags or JavaScript in page edit logs
  • Multiple failed input validation attempts
  • Suspicious user agent strings in access logs

Network Indicators:

  • Unexpected external script loads from Mediawiki pages
  • Suspicious POST requests with script content

SIEM Query:

source="mediawiki_access.log" AND ("<script" OR "javascript:" OR "onerror=" OR "onload=")

🔗 References

📤 Share & Export