CVE-2025-7362: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Wikimedia Foundation Mediawiki - MsUpload extension
The MsUpload extension for MediaWiki is vulnerable to stored XSS via the msu-continue system message, which is inserted into the DOM without proper sanitization. The vulnerability occurs in the file upload UI when the same filename is uploaded twice. This issue affects Mediawiki - MsUpload extension: from 1.39.X before 1.39.13, from 1.42.X before 1.42.7, from 1.43.X before 1.43.2.
AI Analysis
Technical Summary
CVE-2025-7362 is a security vulnerability classified under CWE-79, which pertains to improper neutralization of input during web page generation, commonly known as Cross-site Scripting (XSS). This specific vulnerability affects the MsUpload extension of the MediaWiki platform, maintained by the Wikimedia Foundation. The flaw arises in the file upload user interface, particularly when a user attempts to upload a file with the same filename twice. During this process, the system message 'msu-continue' is inserted into the Document Object Model (DOM) without adequate sanitization or encoding of user-supplied input. This lack of proper input neutralization allows an attacker to inject malicious scripts that are stored persistently within the system message. When other users access the affected page or interface, the malicious script executes in their browsers under the context of the vulnerable MediaWiki site, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the victim user. The vulnerability impacts multiple versions of the MsUpload extension: specifically, versions 1.39.x prior to 1.39.13, 1.42.x prior to 1.42.7, and 1.43.x prior to 1.43.2. As of the publication date, no CVSS score has been assigned, and there are no known exploits in the wild. However, the vulnerability's nature as a stored XSS in a widely used wiki platform extension makes it a significant concern for organizations relying on MediaWiki for collaborative content management.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial, especially for those using MediaWiki with the MsUpload extension for internal knowledge bases, documentation, or public-facing collaborative platforms. Exploitation of this stored XSS vulnerability can lead to unauthorized access to user sessions, enabling attackers to impersonate legitimate users, steal sensitive information, or perform administrative actions if the victim has elevated privileges. This can compromise the confidentiality and integrity of organizational data. Additionally, the execution of malicious scripts could facilitate the distribution of malware or phishing attacks targeted at employees or partners. Given the collaborative nature of MediaWiki, the attack surface includes all users who interact with the file upload interface, potentially affecting a broad user base within an organization. The absence of known exploits in the wild suggests that proactive patching can effectively mitigate risk before widespread exploitation occurs. However, failure to address this vulnerability could lead to reputational damage, regulatory non-compliance (especially under GDPR if personal data is compromised), and operational disruptions.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize updating the MsUpload extension to the latest patched versions: 1.39.13 or later for the 1.39.x branch, 1.42.7 or later for the 1.42.x branch, and 1.43.2 or later for the 1.43.x branch. If immediate patching is not feasible, organizations should implement strict input validation and output encoding on the msu-continue system message to neutralize potentially malicious scripts. Employing Content Security Policy (CSP) headers can help restrict the execution of unauthorized scripts and reduce the impact of XSS attacks. Additionally, organizations should audit their MediaWiki configurations to disable or restrict file uploads where not necessary and monitor logs for suspicious activities related to file uploads or system messages. User education on recognizing phishing attempts and suspicious behavior can further reduce the risk of successful exploitation. Finally, integrating web application firewalls (WAFs) with custom rules to detect and block XSS payloads targeting the MsUpload extension can provide an additional layer of defense.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland
CVE-2025-7362: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Wikimedia Foundation Mediawiki - MsUpload extension
Description
The MsUpload extension for MediaWiki is vulnerable to stored XSS via the msu-continue system message, which is inserted into the DOM without proper sanitization. The vulnerability occurs in the file upload UI when the same filename is uploaded twice. This issue affects Mediawiki - MsUpload extension: from 1.39.X before 1.39.13, from 1.42.X before 1.42.7, from 1.43.X before 1.43.2.
AI-Powered Analysis
Technical Analysis
CVE-2025-7362 is a security vulnerability classified under CWE-79, which pertains to improper neutralization of input during web page generation, commonly known as Cross-site Scripting (XSS). This specific vulnerability affects the MsUpload extension of the MediaWiki platform, maintained by the Wikimedia Foundation. The flaw arises in the file upload user interface, particularly when a user attempts to upload a file with the same filename twice. During this process, the system message 'msu-continue' is inserted into the Document Object Model (DOM) without adequate sanitization or encoding of user-supplied input. This lack of proper input neutralization allows an attacker to inject malicious scripts that are stored persistently within the system message. When other users access the affected page or interface, the malicious script executes in their browsers under the context of the vulnerable MediaWiki site, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the victim user. The vulnerability impacts multiple versions of the MsUpload extension: specifically, versions 1.39.x prior to 1.39.13, 1.42.x prior to 1.42.7, and 1.43.x prior to 1.43.2. As of the publication date, no CVSS score has been assigned, and there are no known exploits in the wild. However, the vulnerability's nature as a stored XSS in a widely used wiki platform extension makes it a significant concern for organizations relying on MediaWiki for collaborative content management.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial, especially for those using MediaWiki with the MsUpload extension for internal knowledge bases, documentation, or public-facing collaborative platforms. Exploitation of this stored XSS vulnerability can lead to unauthorized access to user sessions, enabling attackers to impersonate legitimate users, steal sensitive information, or perform administrative actions if the victim has elevated privileges. This can compromise the confidentiality and integrity of organizational data. Additionally, the execution of malicious scripts could facilitate the distribution of malware or phishing attacks targeted at employees or partners. Given the collaborative nature of MediaWiki, the attack surface includes all users who interact with the file upload interface, potentially affecting a broad user base within an organization. The absence of known exploits in the wild suggests that proactive patching can effectively mitigate risk before widespread exploitation occurs. However, failure to address this vulnerability could lead to reputational damage, regulatory non-compliance (especially under GDPR if personal data is compromised), and operational disruptions.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize updating the MsUpload extension to the latest patched versions: 1.39.13 or later for the 1.39.x branch, 1.42.7 or later for the 1.42.x branch, and 1.43.2 or later for the 1.43.x branch. If immediate patching is not feasible, organizations should implement strict input validation and output encoding on the msu-continue system message to neutralize potentially malicious scripts. Employing Content Security Policy (CSP) headers can help restrict the execution of unauthorized scripts and reduce the impact of XSS attacks. Additionally, organizations should audit their MediaWiki configurations to disable or restrict file uploads where not necessary and monitor logs for suspicious activities related to file uploads or system messages. User education on recognizing phishing attempts and suspicious behavior can further reduce the risk of successful exploitation. Finally, integrating web application firewalls (WAFs) with custom rules to detect and block XSS payloads targeting the MsUpload extension can provide an additional layer of defense.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- wikimedia-foundation
- Date Reserved
- 2025-07-08T17:18:05.309Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 686d54576f40f0eb72f9310f
Added to database: 7/8/2025, 5:24:39 PM
Last enriched: 7/8/2025, 5:40:57 PM
Last updated: 7/8/2025, 7:03:21 PM
Views: 3
Related Threats
CVE-2025-7209: NULL Pointer Dereference in 9fans plan9port
MediumCVE-2025-34085: CWE-434 Unrestricted Upload of File with Dangerous Type in Element Engage LLC Simple File List WordPress Plugin
CriticalCVE-2025-34084: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in BoldGrid Total Upkeep (BoldGrid Backup) WordPress Plugin
CriticalCVE-2025-34083: CWE-434 Unrestricted Upload of File with Dangerous Type in AitThemes AIT CSV Import/Export WordPress Plugin
CriticalCVE-2025-34077: CWE-434 Unrestricted Upload of File with Dangerous Type in Genetech Solutions WordPress Pie Register Plugin
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.