Cross-site Scripting Affecting mediawiki/core package, versions <1.35.14>=1.39.0, <1.39.6>=1.40.0, <1.40.2


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of concept
EPSS
0.05% (22nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross-site Scripting vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PHP-MEDIAWIKICORE-6138019
  • published22 Dec 2023
  • disclosed22 Dec 2023
  • creditTEJ RATHI

Introduced: 22 Dec 2023

CVE-2023-51704  (opens in a new tab)
CWE-80  (opens in a new tab)
First added by Snyk

How to fix?

Upgrade mediawiki/core to version 1.35.14, 1.39.6, 1.40.2 or higher.

Overview

mediawiki/core is a Free software wiki application developed by the Wikimedia Foundation and others.

Note: This package is not maintained on Packagist anymore, but newer releases exist.

Affected versions of this package are vulnerable to Cross-site Scripting due to improper escaping of user-supplied input on the Special:log/rights page and includes/logging/RightsLogFormatter.php file. An attacker to execute malicious scripts within the affected page, posing a risk of unauthorized code execution or other malicious activities.

CVSS Scores

version 3.1