CVE-2025-57880
📋 TL;DR
This CVE describes a cross-site scripting (XSS) vulnerability in BlueSpice's WhoIsOnline extension due to improper output encoding. Attackers can inject malicious scripts that execute in users' browsers when viewing affected pages. This affects BlueSpice installations running versions 5.0 through 5.1.1.
💻 Affected Systems
- BlueSpice MediaWiki distribution
- BlueSpiceWhoIsOnline extension
📦 What is this software?
Bluespice by Hallowelt
⚠️ Risk & Real-World Impact
Worst Case
An attacker could steal session cookies, perform actions as authenticated users, deface the wiki, or redirect users to malicious sites, potentially leading to complete account compromise.
Likely Case
Attackers inject malicious JavaScript to steal session tokens or credentials from authenticated users, leading to unauthorized access to the wiki system.
If Mitigated
With proper input validation and output encoding, the risk is limited to minor content manipulation with no significant security impact.
🎯 Exploit Status
Exploitation requires the attacker to have some level of access to inject malicious content, but detailed exploitation methods are not publicly documented.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: BlueSpice 5.1.2 or later
Vendor Advisory: https://en.wiki.bluespice.com/wiki/Security:Security_Advisories/BSSA-2025-05
Restart Required: No
Instructions:
1. Update BlueSpice to version 5.1.2 or later. 2. Alternatively, update only the BlueSpiceWhoIsOnline extension to the patched version. 3. Clear any caches after updating.
🔧 Temporary Workarounds
Disable WhoIsOnline Extension
allTemporarily disable the vulnerable extension until patching is possible
Edit LocalSettings.php and add: wfLoadExtension( 'BlueSpiceWhoIsOnline' ); // Comment out or remove this line
🧯 If You Can't Patch
- Implement strict Content Security Policy (CSP) headers to restrict script execution
- Use web application firewall (WAF) rules to block XSS payloads targeting the WhoIsOnline functionality
🔍 How to Verify
Check if Vulnerable:
Check BlueSpice version in the wiki footer or via Special:Version page. If version is between 5.0 and 5.1.1 inclusive, the system is vulnerable.
Check Version:
Check Special:Version page in your BlueSpice installation or examine the wiki footer for version information.
Verify Fix Applied:
After updating, verify the version shows 5.1.2 or later. Test the WhoIsOnline functionality to ensure it still works without errors.
📡 Detection & Monitoring
Log Indicators:
- Unusual JavaScript payloads in request logs
- Multiple requests to WhoIsOnline-related endpoints with suspicious parameters
Network Indicators:
- Unexpected outbound connections from wiki users to external domains
- Suspicious JavaScript execution patterns in browser traffic
SIEM Query:
source="apache_access" OR source="nginx_access" AND (uri="*WhoIsOnline*" OR uri="*SpecialWhoIsOnline*") AND (query="*<script*" OR query="*javascript:*" OR query="*onload=*" OR query="*onerror=*")