Listen to this Post
How the CVE Works
The vulnerability arises due to improper sanitization of user-provided short descriptions in the `ShortDescription` MediaWiki extension. The `{{SHORTDESC:}}` parser function processes input without adequate HTML entity encoding, allowing malicious scripts to be stored. When the description is rendered via mw.util.addSub
, the unsanitized input is inserted as raw HTML into the DOM. This enables attackers to inject arbitrary JavaScript, leading to stored Cross-Site Scripting (XSS) attacks. The flaw exists in versions 4.0.0 to 4.0.1, where the `sanitize()` function fails to neutralize HTML entities before decoding.
DailyCVE Form
Platform: StarCitizenTools MediaWiki
Version: 4.0.0 – 4.0.1
Vulnerability: Stored XSS
Severity: High
Date: Jul 3, 2025
Prediction: Patch expected by Jul 10, 2025
What Undercode Say
Analytics:
curl -X GET "https://api.github.com/repos/StarCitizenTools/mediawiki-extensions-ShortDescription/commits" grep -r "sanitize(" /path/to/extensions/ShortDescription/
Exploit:
{{SHORTDESC:<script>alert('XSS')</script>}}
Protection from this CVE:
- Update to v4.0.1
- Disable `$wgShortDescriptionEnableTagline`
– Implement strict HTML sanitization
Impact:
- Arbitrary JS execution
- Session hijacking
- DOM manipulation
Sources:
Reported By: github.com
Extra Source Hub:
Undercode