CVE-2025-32071

5.4 MEDIUM

📋 TL;DR

This CVE describes an improper input validation vulnerability in the MediaWiki Wikidata Extension that allows cross-site scripting (XSS) attacks. Attackers can inject malicious scripts via width/height parameters in image handling, potentially affecting users who view manipulated content. The vulnerability affects MediaWiki installations with the Wikidata Extension versions 1.39 through 1.43.

💻 Affected Systems

Products:
  • MediaWiki Wikidata Extension
Versions: 1.39 through 1.43
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects MediaWiki installations with the Wikidata Extension enabled. Core MediaWiki is not affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could execute arbitrary JavaScript in victims' browsers, potentially stealing session cookies, performing actions as authenticated users, or redirecting to malicious sites.

🟠

Likely Case

Limited XSS attacks targeting specific users who view manipulated images, potentially leading to session hijacking or credential theft.

🟢

If Mitigated

With proper Content Security Policy (CSP) headers and input sanitization, impact is reduced to minor UI manipulation.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires ability to modify image parameters, which may require some level of access depending on configuration.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: MediaWiki 1.43.1 or later

Vendor Advisory: https://phabricator.wikimedia.org/T389369

Restart Required: No

Instructions:

1. Update MediaWiki to version 1.43.1 or later. 2. Ensure Wikidata Extension is updated. 3. Clear caches if applicable.

🔧 Temporary Workarounds

Input Sanitization

all

Implement additional input validation for width/height parameters in image handling functions

CSP Headers

all

Implement strict Content Security Policy headers to mitigate XSS impact

🧯 If You Can't Patch

  • Disable Wikidata Extension if not required
  • Implement web application firewall rules to block suspicious width/height parameters

🔍 How to Verify

Check if Vulnerable:

Check MediaWiki version and verify Wikidata Extension is enabled and within affected version range

Check Version:

Check LocalSettings.php for $wgVersion or use Special:Version page

Verify Fix Applied:

Verify MediaWiki version is 1.43.1 or later and test XSS payloads no longer execute

📡 Detection & Monitoring

Log Indicators:

  • Unusual width/height parameters in image requests
  • JavaScript execution errors in browser logs

Network Indicators:

  • Suspicious parameter values in HTTP requests to image handlers

SIEM Query:

web_requests WHERE url CONTAINS 'width=' OR url CONTAINS 'height=' AND parameter_value MATCHES '<script|javascript:'

🔗 References

📤 Share & Export