Cross-site Scripting (XSS) Affecting mediawiki package, versions *


Severity

Recommended
medium

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

EPSS
0.14% (51st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross-site Scripting (XSS) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RHEL9-MEDIAWIKI-3394420
  • published26 Mar 2023
  • disclosed18 Dec 2020

Introduced: 18 Dec 2020

CVE-2020-35475  (opens in a new tab)
CWE-79  (opens in a new tab)

How to fix?

There is no fixed version for RHEL:9 mediawiki.

NVD Description

Note: Versions mentioned in the description apply only to the upstream mediawiki package and not the mediawiki package as distributed by RHEL. See How to fix? for RHEL:9 relevant fixed versions and status.

In MediaWiki before 1.35.1, the messages userrights-expiry-current and userrights-expiry-none can contain raw HTML. XSS can happen when a user visits Special:UserRights but does not have rights to change all userrights, and the table on the left side has unchangeable groups in it. (The right column with the changeable groups is not affected and is escaped correctly.)

CVSS Scores

version 3.1