Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-30917: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in weirdgloop mediawiki-extensions-Bucket

0
High
VulnerabilityCVE-2026-30917cvecve-2026-30917cwe-79
Published: Mon Mar 09 2026 (03/09/2026, 22:50:20 UTC)
Source: CVE Database V5
Vendor/Project: weirdgloop
Product: mediawiki-extensions-Bucket

Description

Bucket is a MediaWiki extension to store and retrieve structured data on articles. Prior to 2.1.1, a stored XSS can be inserted into any Bucket table field that has a PAGE type, which will execute whenever a user views that table's corresponding Bucket namespace page. This vulnerability is fixed in 2.1.1.

AI-Powered Analysis

AILast updated: 03/09/2026, 23:18:33 UTC

Technical Analysis

CVE-2026-30917 is a stored Cross-site Scripting (XSS) vulnerability identified in the weirdgloop MediaWiki extension named Bucket, which is designed to store and retrieve structured data on articles. The vulnerability exists in all versions prior to 2.1.1 and is caused by improper neutralization of input during web page generation, classified under CWE-79. Specifically, an attacker can inject malicious JavaScript payloads into any Bucket table field that is of PAGE type. When a user views the Bucket namespace page corresponding to the affected table, the injected script executes in the context of the victim's browser. This stored XSS does not require any authentication or user interaction, making it remotely exploitable over the network. The vulnerability can lead to session hijacking, credential theft, defacement, or further exploitation of the victim's environment. The CVSS 4.0 base score is 8.8, reflecting its high severity, with attack vector as network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality (VC:H), with lower impacts on integrity and availability. Although no known exploits have been reported in the wild, the vulnerability poses a significant risk to any MediaWiki instance using the Bucket extension before version 2.1.1. The issue was publicly disclosed on March 9, 2026, and fixed in version 2.1.1. The lack of patch links in the provided data suggests users should obtain updates directly from the official weirdgloop or MediaWiki extension repositories. The vulnerability's exploitation could compromise the confidentiality and integrity of data managed within MediaWiki platforms, potentially affecting organizational knowledge bases and collaborative workflows.

Potential Impact

The impact of CVE-2026-30917 is substantial for organizations using MediaWiki with the Bucket extension, especially versions prior to 2.1.1. Successful exploitation allows attackers to execute arbitrary JavaScript in the context of users viewing the affected pages, leading to session hijacking, theft of sensitive information such as credentials or tokens, unauthorized actions performed on behalf of users, and potential spread of malware. This can undermine the confidentiality and integrity of organizational data and disrupt availability if attackers deface or manipulate content. Since the vulnerability requires no authentication or user interaction, it can be exploited remotely and at scale, increasing the risk of widespread compromise. Organizations relying on MediaWiki for internal documentation, knowledge sharing, or public-facing content management are particularly vulnerable. The attack surface includes all users who access the Bucket namespace pages, potentially including administrators and privileged users, which could escalate the severity of the breach. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as public disclosure often leads to rapid development of exploit code. Failure to remediate promptly could result in data breaches, reputational damage, and regulatory consequences, especially for entities handling sensitive or regulated information.

Mitigation Recommendations

To mitigate CVE-2026-30917, organizations should immediately upgrade the weirdgloop MediaWiki extension Bucket to version 2.1.1 or later, where the vulnerability is fixed. If upgrading is not immediately feasible, implement strict input validation and output encoding on all Bucket table fields of PAGE type to neutralize potentially malicious scripts. Restrict access to Bucket namespace pages to trusted users only, employing role-based access controls and network segmentation to limit exposure. Employ Content Security Policy (CSP) headers to reduce the impact of any injected scripts by restricting the sources from which scripts can be loaded and executed. Regularly audit MediaWiki extensions and configurations for security compliance and monitor logs for unusual activity indicative of exploitation attempts. Educate users about the risks of XSS and encourage cautious behavior when interacting with MediaWiki content. Finally, maintain an up-to-date inventory of MediaWiki extensions and versions deployed to ensure timely application of security patches and updates.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-07T16:40:05.884Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69af51f2ea502d3aa8d1f2ca

Added to database: 3/9/2026, 11:04:18 PM

Last enriched: 3/9/2026, 11:18:33 PM

Last updated: 3/13/2026, 1:05:08 PM

Views: 73

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses