CVE-2020-25815: MediaWiki Cross-site Scripting (XSS) vulnerability
(updated )
An issue was discovered in MediaWiki 1.32.x through 1.34.x before 1.34.4. LogEventList::getFiltersDesc is insecurely using message text to build options names for an HTML multi-select field. The relevant code should use escaped() instead of text().
References
- gerrit.wikimedia.org/g/mediawiki/core/+/ec76e14be658187544f07c1a249a047e1a75eaf8/includes/logging/LogEventsList.php
- github.com/FriendsOfPHP/security-advisories/blob/master/mediawiki/core/CVE-2020-25815.yaml
- github.com/advisories/GHSA-2f58-vf6g-6p8x
- github.com/wikimedia/mediawiki
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RTTPZ7XMDS66I442OLLHXBDNP2LCBJU6
- lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html
- lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html
- nvd.nist.gov/vuln/detail/CVE-2020-25815
- phabricator.wikimedia.org/T256171
Detect and mitigate CVE-2020-25815 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →