Skip to main content

CVE-2025-7362: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Wikimedia Foundation Mediawiki - MsUpload extension

Medium
VulnerabilityCVE-2025-7362cvecve-2025-7362cwe-79
Published: Tue Jul 08 2025 (07/08/2025, 17:22:35 UTC)
Source: CVE Database V5
Vendor/Project: Wikimedia Foundation
Product: Mediawiki - MsUpload extension

Description

The MsUpload extension for MediaWiki is vulnerable to stored XSS via the msu-continue system message, which is inserted into the DOM without proper sanitization. The vulnerability occurs in the file upload UI when the same filename is uploaded twice. This issue affects Mediawiki - MsUpload extension: from 1.39.X before 1.39.13, from 1.42.X before 1.42.7, from 1.43.X before 1.43.2.

AI-Powered Analysis

AILast updated: 07/15/2025, 21:40:31 UTC

Technical Analysis

CVE-2025-7362 is a medium-severity stored Cross-Site Scripting (XSS) vulnerability affecting the MsUpload extension of the MediaWiki platform maintained by the Wikimedia Foundation. The vulnerability arises due to improper neutralization of input during web page generation (CWE-79). Specifically, the msu-continue system message, which is inserted into the Document Object Model (DOM) without adequate sanitization, can be exploited when a user uploads a file with a filename that has already been uploaded previously. This leads to the injection of malicious scripts that persist on the server and execute in the browsers of users who view the affected pages. The vulnerability affects MediaWiki MsUpload extension versions 1.39.x prior to 1.39.13, 1.42.x prior to 1.42.7, and 1.43.x prior to 1.43.2. The CVSS 3.1 base score is 5.4, indicating a medium severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), user interaction (UI:R), and a scope change (S:C). The impact affects confidentiality and integrity but not availability. No known exploits are currently reported in the wild. The vulnerability requires an authenticated user to upload files and some user interaction to trigger the malicious script execution. The scope change indicates that the vulnerability can affect resources beyond the initially vulnerable component, potentially impacting other parts of the MediaWiki installation or users accessing the system. This vulnerability is significant because MediaWiki is widely used for collaborative documentation and knowledge bases, including many public and private wikis in Europe. Exploitation could allow attackers to execute arbitrary JavaScript in the context of the victim's browser, potentially leading to session hijacking, credential theft, or unauthorized actions within the wiki environment.

Potential Impact

For European organizations using MediaWiki with the MsUpload extension, this vulnerability poses a risk of client-side attacks that can compromise user accounts and sensitive information stored within the wiki. Since MediaWiki is often used for internal knowledge management, documentation, and collaboration, an attacker exploiting this XSS flaw could impersonate legitimate users, manipulate wiki content, or steal confidential data. The requirement for authenticated access limits the attack surface to users with upload privileges, but insider threats or compromised accounts could be leveraged. The scope change means that the impact could extend beyond the immediate MsUpload extension, potentially affecting other integrated systems or services relying on MediaWiki. In regulated industries common in Europe, such as finance, healthcare, and government, such a breach could lead to compliance violations under GDPR and other data protection laws, resulting in legal and reputational damage. Additionally, the persistence of the stored XSS increases the risk of widespread impact as multiple users accessing the affected pages could be compromised.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize upgrading the MsUpload extension to the fixed versions: 1.39.13 or later for the 1.39.x branch, 1.42.7 or later for the 1.42.x branch, and 1.43.2 or later for the 1.43.x branch. If immediate patching is not feasible, organizations should implement strict input validation and output encoding on the msu-continue system message to sanitize any user-supplied filenames or messages before insertion into the DOM. Restricting file upload privileges to trusted users and monitoring upload activity for suspicious patterns can reduce risk. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers accessing the wiki. Regularly audit MediaWiki extensions and configurations for security best practices. Additionally, educating users about the risks of clicking on unexpected links or interacting with suspicious wiki content can help reduce exploitation likelihood. Logging and monitoring for unusual user behavior or error messages related to file uploads can provide early detection of exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
wikimedia-foundation
Date Reserved
2025-07-08T17:18:05.309Z
Cvss Version
null
State
PUBLISHED

Threat ID: 686d54576f40f0eb72f9310f

Added to database: 7/8/2025, 5:24:39 PM

Last enriched: 7/15/2025, 9:40:31 PM

Last updated: 8/19/2025, 6:35:46 AM

Views: 26

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats