CVE-2025-32073

5.4 MEDIUM

📋 TL;DR

This CVE describes an improper input validation vulnerability in MediaWiki's HTML Tags extension that allows cross-site scripting (XSS) attacks. Attackers can inject malicious scripts that execute in users' browsers when they view specially crafted content. This affects MediaWiki installations running HTML Tags extension versions 1.39 through 1.43.

💻 Affected Systems

Products:
  • MediaWiki HTML Tags extension
Versions: 1.39 through 1.43
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects MediaWiki installations with the HTML Tags extension enabled. The vulnerability is in the extension, not core MediaWiki.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, perform actions as authenticated users, deface pages, or redirect users to malicious sites, potentially compromising entire user accounts and administrative functions.

🟠

Likely Case

Attackers with edit permissions could embed malicious scripts in pages that execute when other users view those pages, leading to session hijacking or credential theft.

🟢

If Mitigated

With proper input sanitization and Content Security Policy headers, the impact is limited to script execution in specific contexts, though data exfiltration remains possible.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires the ability to edit pages with HTML tags. The vulnerability is in input validation for HTML tag attributes.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.43.1 or later

Vendor Advisory: https://phabricator.wikimedia.org/T386337

Restart Required: No

Instructions:

1. Update the HTML Tags extension to version 1.43.1 or later. 2. If using MediaWiki 1.39-1.42, backport the fix from the provided gerrit link. 3. Clear any caches after updating.

🔧 Temporary Workarounds

Disable HTML Tags extension

all

Temporarily disable the vulnerable extension until patching is possible

Remove or comment out wfLoadExtension('HTMLTags'); from LocalSettings.php

Restrict edit permissions

all

Limit who can edit pages containing HTML tags to trusted users only

🧯 If You Can't Patch

  • Implement strict Content Security Policy headers to mitigate XSS impact
  • Enable MediaWiki's built-in XSS protection features and sanitization filters

🔍 How to Verify

Check if Vulnerable:

Check the HTML Tags extension version in MediaWiki's Special:Version page or examine the extension's version file

Check Version:

grep -r 'HTMLTags.*version' /path/to/mediawiki/extensions/HTMLTags/ || php /path/to/mediawiki/maintenance/showSiteStats.php

Verify Fix Applied:

Verify the HTML Tags extension version is 1.43.1 or later, and test that HTML tag attributes are properly sanitized

📡 Detection & Monitoring

Log Indicators:

  • Unusual edit patterns to pages with HTML tags
  • Multiple failed sanitization attempts in MediaWiki logs

Network Indicators:

  • Unexpected outbound connections from MediaWiki servers after page views
  • Suspicious JavaScript payloads in HTTP requests

SIEM Query:

source="mediawiki.log" AND ("HTMLTags" OR "XSS" OR "script injection")

🔗 References

📤 Share & Export