Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22710: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in The Wikimedia Foundation Mediawiki - Wikibase Extension

0
Low
VulnerabilityCVE-2026-22710cvecve-2026-22710cwe-79
Published: Thu Jan 08 2026 (01/08/2026, 23:48:51 UTC)
Source: CVE Database V5
Vendor/Project: The Wikimedia Foundation
Product: Mediawiki - Wikibase Extension

Description

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in The Wikimedia Foundation Mediawiki - Wikibase Extension allows Cross-Site Scripting (XSS).This issue affects Mediawiki - Wikibase Extension: 1.45, 1.44, 1.43, 1.39.

AI-Powered Analysis

AILast updated: 01/09/2026, 00:10:56 UTC

Technical Analysis

CVE-2026-22710 is a vulnerability classified under CWE-79 (Improper Neutralization of Input During Web Page Generation), commonly known as Cross-Site Scripting (XSS), found in the Mediawiki Wikibase Extension maintained by the Wikimedia Foundation. The affected versions include 1.39, 1.43, 1.44, and 1.45. This vulnerability occurs because the extension does not properly sanitize or encode user-supplied input before including it in dynamically generated web pages. As a result, an attacker can inject malicious JavaScript code that executes in the context of users visiting the affected Mediawiki instance. The CVSS 4.0 vector indicates the attack can be performed remotely (AV:N) with low attack complexity (AC:L) and does not require privileges (PR:N), but does require user interaction (UI:P). The impact on confidentiality and integrity is low, with no direct effect on availability. No known exploits have been reported in the wild, and no official patches are linked yet, indicating this is a recently disclosed issue. The vulnerability primarily threatens users of Mediawiki installations that utilize the Wikibase Extension, which is often used for structured data management in wiki environments.

Potential Impact

For European organizations, especially those relying on Mediawiki with the Wikibase Extension for knowledge management, documentation, or open data projects, this vulnerability could lead to unauthorized script execution in users' browsers. Potential impacts include session hijacking, phishing, defacement, or unauthorized actions performed on behalf of users. Although the CVSS score is low, the risk is heightened in environments with many users or where sensitive information is accessible via the wiki. Public sector entities, research institutions, and companies using Mediawiki for collaborative platforms could face reputational damage or data integrity issues if exploited. However, the lack of known exploits and the requirement for user interaction limit the immediate threat level. Still, the vulnerability could be leveraged as part of a broader attack chain or social engineering campaign.

Mitigation Recommendations

Organizations should monitor for official patches or updates from the Wikimedia Foundation and apply them promptly once available. In the interim, administrators can implement strict input validation and output encoding on all user-supplied data within the Wikibase Extension context to prevent script injection. Deploying a robust Content Security Policy (CSP) can help restrict the execution of unauthorized scripts. Additionally, reviewing and limiting user permissions to reduce the risk of malicious input submission is advisable. Regular security audits of Mediawiki installations and user training to recognize phishing or suspicious content can further reduce risk. If feasible, isolating the Mediawiki environment or restricting access to trusted users can minimize exposure. Logging and monitoring for unusual activity related to the wiki platform should be enhanced to detect potential exploitation attempts early.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
wikimedia-foundation
Date Reserved
2026-01-08T23:23:42.385Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69604433ecefc3cd7c741f53

Added to database: 1/8/2026, 11:56:35 PM

Last enriched: 1/9/2026, 12:10:56 AM

Last updated: 1/9/2026, 4:31:50 PM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats