Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22712: CWE-116 Improper Encoding or Escaping of Output in The Wikimedia Foundation Mediawiki - ApprovedRevs Extension

0
Low
VulnerabilityCVE-2026-22712cvecve-2026-22712cwe-116
Published: Fri Jan 09 2026 (01/09/2026, 00:06:22 UTC)
Source: CVE Database V5
Vendor/Project: The Wikimedia Foundation
Product: Mediawiki - ApprovedRevs Extension

Description

Improper Encoding or Escaping of Output due to magic word replacement in ParserAfterTidy vulnerability in The Wikimedia Foundation Mediawiki - ApprovedRevs Extension allows Input Data Manipulation.This issue affects Mediawiki - ApprovedRevs Extension: 1.45, 1.44, 1.43, 1.39.

AI-Powered Analysis

AILast updated: 01/09/2026, 10:32:53 UTC

Technical Analysis

CVE-2026-22712 is a vulnerability classified under CWE-116, which pertains to improper encoding or escaping of output. This flaw exists in the ApprovedRevs Extension of the Mediawiki software maintained by the Wikimedia Foundation, specifically in versions 1.39, 1.43, 1.44, and 1.45. The vulnerability arises from the magic word replacement mechanism during the ParserAfterTidy phase, where user-supplied input is not properly encoded or escaped before being rendered. This improper handling can lead to input data manipulation, potentially allowing an attacker to inject crafted content that could alter the output in unintended ways. Although the CVSS 4.0 base score is low (2.3), indicating limited impact, the vulnerability is remotely exploitable over the network without requiring privileges but does require user interaction. The impact on confidentiality, integrity, and availability is low, suggesting that while the flaw could be used to manipulate displayed content, it is unlikely to lead to severe system compromise or data breaches. No known exploits have been reported in the wild, and no official patches have been released at the time of publication. The vulnerability’s root cause is the failure to properly encode or escape output after the parsing and tidying process, which is critical in preventing injection attacks such as cross-site scripting (XSS).

Potential Impact

For European organizations, the impact of CVE-2026-22712 is relatively limited due to its low severity score and the requirement for user interaction. However, organizations relying on Mediawiki with the ApprovedRevs Extension for internal or public knowledge management could face risks of content manipulation or defacement. This could undermine trust in the integrity of information, especially in governmental, educational, or research institutions that use Mediawiki extensively. While the vulnerability does not directly lead to data exfiltration or system compromise, manipulated content could be used for social engineering or misinformation campaigns. The low impact on confidentiality and availability means critical systems are unlikely to be disrupted, but reputational damage and misinformation risks remain. European organizations with public-facing wikis or collaborative platforms should be aware of this threat and prepare to mitigate it promptly.

Mitigation Recommendations

To mitigate CVE-2026-22712, European organizations should take several specific steps beyond generic advice: 1) Immediately audit and restrict user permissions on Mediawiki installations to limit who can edit or add content, especially in the ApprovedRevs Extension context. 2) Implement strict input validation and sanitization on all user inputs that interact with the magic word replacement functionality to prevent injection of malicious content. 3) Monitor wiki edits and revisions for unusual or suspicious changes that could indicate exploitation attempts. 4) Deploy web application firewalls (WAFs) with custom rules to detect and block attempts to exploit output encoding flaws. 5) Stay informed about official patches or updates from the Wikimedia Foundation and apply them promptly once available. 6) Consider temporarily disabling the ApprovedRevs Extension if feasible until a patch is released. 7) Educate wiki administrators and users about the risks of input manipulation and encourage vigilance in reviewing content changes. These targeted actions will reduce the attack surface and help prevent exploitation of this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
wikimedia-foundation
Date Reserved
2026-01-08T23:23:42.385Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6960d929a48af7d8ce7ea26c

Added to database: 1/9/2026, 10:32:09 AM

Last enriched: 1/9/2026, 10:32:53 AM

Last updated: 1/9/2026, 11:34:58 PM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats