CVE-2026-30917: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in weirdgloop mediawiki-extensions-Bucket
Bucket is a MediaWiki extension to store and retrieve structured data on articles. Prior to 2.1.1, a stored XSS can be inserted into any Bucket table field that has a PAGE type, which will execute whenever a user views that table's corresponding Bucket namespace page. This vulnerability is fixed in 2.1.1.
AI Analysis
Technical Summary
CVE-2026-30917 is a stored Cross-site Scripting (XSS) vulnerability identified in the weirdgloop MediaWiki extension named Bucket, which is designed to store and retrieve structured data on articles. The vulnerability exists in all versions prior to 2.1.1 and is caused by improper neutralization of input during web page generation, classified under CWE-79. Specifically, an attacker can inject malicious JavaScript payloads into any Bucket table field that is of PAGE type. When a user views the Bucket namespace page corresponding to the affected table, the injected script executes in the context of the victim's browser. This stored XSS does not require any authentication or user interaction, making it remotely exploitable over the network. The vulnerability can lead to session hijacking, credential theft, defacement, or further exploitation of the victim's environment. The CVSS 4.0 base score is 8.8, reflecting its high severity, with attack vector as network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality (VC:H), with lower impacts on integrity and availability. Although no known exploits have been reported in the wild, the vulnerability poses a significant risk to any MediaWiki instance using the Bucket extension before version 2.1.1. The issue was publicly disclosed on March 9, 2026, and fixed in version 2.1.1. The lack of patch links in the provided data suggests users should obtain updates directly from the official weirdgloop or MediaWiki extension repositories. The vulnerability's exploitation could compromise the confidentiality and integrity of data managed within MediaWiki platforms, potentially affecting organizational knowledge bases and collaborative workflows.
Potential Impact
The impact of CVE-2026-30917 is substantial for organizations using MediaWiki with the Bucket extension, especially versions prior to 2.1.1. Successful exploitation allows attackers to execute arbitrary JavaScript in the context of users viewing the affected pages, leading to session hijacking, theft of sensitive information such as credentials or tokens, unauthorized actions performed on behalf of users, and potential spread of malware. This can undermine the confidentiality and integrity of organizational data and disrupt availability if attackers deface or manipulate content. Since the vulnerability requires no authentication or user interaction, it can be exploited remotely and at scale, increasing the risk of widespread compromise. Organizations relying on MediaWiki for internal documentation, knowledge sharing, or public-facing content management are particularly vulnerable. The attack surface includes all users who access the Bucket namespace pages, potentially including administrators and privileged users, which could escalate the severity of the breach. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as public disclosure often leads to rapid development of exploit code. Failure to remediate promptly could result in data breaches, reputational damage, and regulatory consequences, especially for entities handling sensitive or regulated information.
Mitigation Recommendations
To mitigate CVE-2026-30917, organizations should immediately upgrade the weirdgloop MediaWiki extension Bucket to version 2.1.1 or later, where the vulnerability is fixed. If upgrading is not immediately feasible, implement strict input validation and output encoding on all Bucket table fields of PAGE type to neutralize potentially malicious scripts. Restrict access to Bucket namespace pages to trusted users only, employing role-based access controls and network segmentation to limit exposure. Employ Content Security Policy (CSP) headers to reduce the impact of any injected scripts by restricting the sources from which scripts can be loaded and executed. Regularly audit MediaWiki extensions and configurations for security compliance and monitor logs for unusual activity indicative of exploitation attempts. Educate users about the risks of XSS and encourage cautious behavior when interacting with MediaWiki content. Finally, maintain an up-to-date inventory of MediaWiki extensions and versions deployed to ensure timely application of security patches and updates.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, Japan, France, Netherlands, Sweden, Switzerland
CVE-2026-30917: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in weirdgloop mediawiki-extensions-Bucket
Description
Bucket is a MediaWiki extension to store and retrieve structured data on articles. Prior to 2.1.1, a stored XSS can be inserted into any Bucket table field that has a PAGE type, which will execute whenever a user views that table's corresponding Bucket namespace page. This vulnerability is fixed in 2.1.1.
AI-Powered Analysis
Technical Analysis
CVE-2026-30917 is a stored Cross-site Scripting (XSS) vulnerability identified in the weirdgloop MediaWiki extension named Bucket, which is designed to store and retrieve structured data on articles. The vulnerability exists in all versions prior to 2.1.1 and is caused by improper neutralization of input during web page generation, classified under CWE-79. Specifically, an attacker can inject malicious JavaScript payloads into any Bucket table field that is of PAGE type. When a user views the Bucket namespace page corresponding to the affected table, the injected script executes in the context of the victim's browser. This stored XSS does not require any authentication or user interaction, making it remotely exploitable over the network. The vulnerability can lead to session hijacking, credential theft, defacement, or further exploitation of the victim's environment. The CVSS 4.0 base score is 8.8, reflecting its high severity, with attack vector as network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality (VC:H), with lower impacts on integrity and availability. Although no known exploits have been reported in the wild, the vulnerability poses a significant risk to any MediaWiki instance using the Bucket extension before version 2.1.1. The issue was publicly disclosed on March 9, 2026, and fixed in version 2.1.1. The lack of patch links in the provided data suggests users should obtain updates directly from the official weirdgloop or MediaWiki extension repositories. The vulnerability's exploitation could compromise the confidentiality and integrity of data managed within MediaWiki platforms, potentially affecting organizational knowledge bases and collaborative workflows.
Potential Impact
The impact of CVE-2026-30917 is substantial for organizations using MediaWiki with the Bucket extension, especially versions prior to 2.1.1. Successful exploitation allows attackers to execute arbitrary JavaScript in the context of users viewing the affected pages, leading to session hijacking, theft of sensitive information such as credentials or tokens, unauthorized actions performed on behalf of users, and potential spread of malware. This can undermine the confidentiality and integrity of organizational data and disrupt availability if attackers deface or manipulate content. Since the vulnerability requires no authentication or user interaction, it can be exploited remotely and at scale, increasing the risk of widespread compromise. Organizations relying on MediaWiki for internal documentation, knowledge sharing, or public-facing content management are particularly vulnerable. The attack surface includes all users who access the Bucket namespace pages, potentially including administrators and privileged users, which could escalate the severity of the breach. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as public disclosure often leads to rapid development of exploit code. Failure to remediate promptly could result in data breaches, reputational damage, and regulatory consequences, especially for entities handling sensitive or regulated information.
Mitigation Recommendations
To mitigate CVE-2026-30917, organizations should immediately upgrade the weirdgloop MediaWiki extension Bucket to version 2.1.1 or later, where the vulnerability is fixed. If upgrading is not immediately feasible, implement strict input validation and output encoding on all Bucket table fields of PAGE type to neutralize potentially malicious scripts. Restrict access to Bucket namespace pages to trusted users only, employing role-based access controls and network segmentation to limit exposure. Employ Content Security Policy (CSP) headers to reduce the impact of any injected scripts by restricting the sources from which scripts can be loaded and executed. Regularly audit MediaWiki extensions and configurations for security compliance and monitor logs for unusual activity indicative of exploitation attempts. Educate users about the risks of XSS and encourage cautious behavior when interacting with MediaWiki content. Finally, maintain an up-to-date inventory of MediaWiki extensions and versions deployed to ensure timely application of security patches and updates.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-07T16:40:05.884Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69af51f2ea502d3aa8d1f2ca
Added to database: 3/9/2026, 11:04:18 PM
Last enriched: 3/9/2026, 11:18:33 PM
Last updated: 3/13/2026, 1:05:08 PM
Views: 73
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.