StarCitizenTools MediaWiki, Stored XSS Vulnerability, CVE-2025-XXXXX (High Severity)

Listen to this Post

How the CVE Works

The vulnerability arises due to improper sanitization of user-provided short descriptions in the `ShortDescription` MediaWiki extension. The `{{SHORTDESC:}}` parser function processes input without adequate HTML entity encoding, allowing malicious scripts to be stored. When the description is rendered via mw.util.addSub, the unsanitized input is inserted as raw HTML into the DOM. This enables attackers to inject arbitrary JavaScript, leading to stored Cross-Site Scripting (XSS) attacks. The flaw exists in versions 4.0.0 to 4.0.1, where the `sanitize()` function fails to neutralize HTML entities before decoding.

DailyCVE Form

Platform: StarCitizenTools MediaWiki
Version: 4.0.0 – 4.0.1
Vulnerability: Stored XSS
Severity: High
Date: Jul 3, 2025

Prediction: Patch expected by Jul 10, 2025

What Undercode Say

Analytics:

curl -X GET "https://api.github.com/repos/StarCitizenTools/mediawiki-extensions-ShortDescription/commits"
grep -r "sanitize(" /path/to/extensions/ShortDescription/

Exploit:

{{SHORTDESC:<script>alert('XSS')</script>}}

Protection from this CVE:

  • Update to v4.0.1
  • Disable `$wgShortDescriptionEnableTagline`
    – Implement strict HTML sanitization

Impact:

  • Arbitrary JS execution
  • Session hijacking
  • DOM manipulation

Sources:

Reported By: github.com
Extra Source Hub:
Undercode

πŸ”JOIN OUR CYBER WORLD [ CVE News β€’ HackMonitor β€’ UndercodeNews ]

πŸ’¬ Whatsapp | πŸ’¬ Telegram

πŸ“’ Follow DailyCVE & Stay Tuned:

𝕏 formerly Twitter 🐦 | @ Threads | πŸ”— Linkedin Featured Image

Scroll to Top