Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0670: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Wikimedia Foundation MediaWiki - ProofreadPage Extension

0
Medium
VulnerabilityCVE-2026-0670cvecve-2026-0670cwe-79
Published: Wed Jan 07 2026 (01/07/2026, 18:55:42 UTC)
Source: CVE Database V5
Vendor/Project: Wikimedia Foundation
Product: MediaWiki - ProofreadPage Extension

Description

CVE-2026-0670 is a medium severity Cross-Site Scripting (XSS) vulnerability in the ProofreadPage extension of Wikimedia Foundation's MediaWiki software versions 1. 39, 1. 43, 1. 44, and 1. 45. This vulnerability arises from improper neutralization of input during web page generation, allowing attackers to inject malicious scripts that execute in the context of users' browsers. Exploitation requires user interaction but no authentication, and can lead to limited confidentiality and integrity impacts, such as session hijacking or content manipulation. No known exploits are currently in the wild, and no patches have been linked yet. European organizations using MediaWiki with the ProofreadPage extension, especially those involved in collaborative documentation or digital libraries, should be aware of this risk. Mitigation involves applying patches when available, sanitizing user inputs, and employing Content Security Policies.

AI-Powered Analysis

AILast updated: 01/14/2026, 19:45:59 UTC

Technical Analysis

CVE-2026-0670 identifies a Cross-Site Scripting (XSS) vulnerability classified under CWE-79 in the ProofreadPage extension of the MediaWiki platform maintained by the Wikimedia Foundation. The vulnerability affects versions 1.39, 1.43, 1.44, and 1.45 of the extension. It stems from improper neutralization of user-supplied input during the generation of web pages, which allows attackers to inject malicious JavaScript code. When a victim user views a crafted page, the injected script executes within their browser context, potentially compromising session tokens, cookies, or enabling actions on behalf of the user. The CVSS 3.1 base score is 6.1 (medium), reflecting network attack vector, low attack complexity, no privileges required, but requiring user interaction. The scope is changed, indicating the vulnerability affects components beyond the initially vulnerable extension, potentially impacting the entire MediaWiki instance. No public exploits or patches are currently documented, indicating the vulnerability is newly disclosed. The ProofreadPage extension is commonly used in environments requiring collaborative proofreading and digitization workflows, making it a target for attackers aiming to compromise user sessions or inject misleading content. The vulnerability does not affect availability but impacts confidentiality and integrity to a limited extent.

Potential Impact

For European organizations, especially those using MediaWiki with the ProofreadPage extension in sectors such as education, cultural heritage, government, and research, this vulnerability poses a risk of session hijacking, unauthorized actions, and misinformation through content manipulation. Attackers could exploit this to steal user credentials or impersonate users, potentially leading to unauthorized access to sensitive information or disruption of collaborative workflows. Although the impact on availability is negligible, the breach of confidentiality and integrity could undermine trust in publicly accessible or internal knowledge bases. The requirement for user interaction limits mass exploitation but targeted phishing or social engineering campaigns could increase risk. Organizations relying heavily on MediaWiki for documentation or digital archiving should consider this vulnerability a moderate threat to their operational security and data integrity.

Mitigation Recommendations

Organizations should monitor for official patches or updates from the Wikimedia Foundation and apply them promptly once available. In the interim, administrators should implement strict input validation and output encoding on all user-supplied content within the ProofreadPage extension. Employing Content Security Policy (CSP) headers can help mitigate the impact of injected scripts by restricting script execution sources. Disabling or restricting the use of the ProofreadPage extension temporarily may be considered if patching is delayed and risk is high. User awareness training to recognize phishing attempts that could trigger malicious links is advisable. Regular security audits and penetration testing focusing on web application vulnerabilities can help identify similar issues proactively. Additionally, configuring MediaWiki to use secure cookies and enforcing HTTPS can reduce session hijacking risks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
wikimedia-foundation
Date Reserved
2026-01-07T16:35:04.806Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695eb01e7349d0379dbd7dfa

Added to database: 1/7/2026, 7:12:30 PM

Last enriched: 1/14/2026, 7:45:59 PM

Last updated: 2/6/2026, 1:50:36 AM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats