Skip to main content

CVE-2024-23177: n/a in n/a

Medium
VulnerabilityCVE-2024-23177cvecve-2024-23177
Published: Fri Jan 12 2024 (01/12/2024, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: n/a

Description

An issue was discovered in the WatchAnalytics extension in MediaWiki before 1.40.2. XSS can occur via the Special:PageStatistics page parameter.

AI-Powered Analysis

AILast updated: 07/03/2025, 21:57:06 UTC

Technical Analysis

CVE-2024-23177 is a cross-site scripting (XSS) vulnerability identified in the WatchAnalytics extension of MediaWiki versions prior to 1.40.2. The vulnerability arises due to improper sanitization of input parameters on the Special:PageStatistics page, allowing an attacker to inject malicious scripts via the page parameter. When a user with appropriate privileges or any user accesses the vulnerable page with a crafted URL, the injected script executes in the context of the victim's browser. This can lead to theft of session cookies, user impersonation, or other malicious actions within the scope of the MediaWiki application. The vulnerability is classified under CWE-79, which pertains to improper neutralization of input during web page generation. The CVSS v3.1 score of 6.1 reflects a medium severity, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), scope changed (S:C), and low impact on confidentiality and integrity (C:L/I:L) with no impact on availability (A:N). No known exploits are currently reported in the wild, and no official patch links are provided yet, but upgrading to MediaWiki 1.40.2 or later is implied as a mitigation step. This vulnerability affects MediaWiki installations using the WatchAnalytics extension, which is commonly deployed in organizations relying on MediaWiki for collaborative documentation and knowledge management.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to those using MediaWiki with the WatchAnalytics extension for internal or public-facing knowledge bases. Exploitation could lead to session hijacking or unauthorized actions performed under the victim's credentials, potentially exposing sensitive organizational information or enabling further lateral movement within the network. Given that MediaWiki is widely used in academic institutions, government agencies, and enterprises across Europe, the impact could be significant if exploited, especially in environments where user privileges are not tightly controlled. The scope change indicated by the CVSS vector suggests that the vulnerability could allow an attacker to affect resources beyond the initially vulnerable component, increasing the potential damage. However, the requirement for user interaction (clicking a malicious link) somewhat limits the ease of exploitation. Nonetheless, phishing campaigns or social engineering could be used to trigger the vulnerability. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits soon after disclosure.

Mitigation Recommendations

European organizations should prioritize upgrading MediaWiki installations to version 1.40.2 or later, where the vulnerability is addressed. In the absence of an official patch, organizations can implement input validation and output encoding on the Special:PageStatistics page parameters to neutralize malicious scripts. Deploying web application firewalls (WAFs) with rules targeting XSS payloads specific to MediaWiki can provide temporary protection. Additionally, organizations should conduct user awareness training to reduce the risk of successful phishing attacks that could deliver malicious URLs exploiting this vulnerability. Monitoring web server logs for unusual requests to Special:PageStatistics with suspicious parameters can help detect attempted exploitation. Restricting access to the Special:PageStatistics page to trusted users only and applying the principle of least privilege to MediaWiki user roles will also reduce the attack surface. Regular security audits and vulnerability scanning of MediaWiki deployments are recommended to identify and remediate similar issues proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-01-12T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683f034b182aa0cae27e66d7

Added to database: 6/3/2025, 2:14:35 PM

Last enriched: 7/3/2025, 9:57:06 PM

Last updated: 7/31/2025, 2:22:20 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats