Show filters
373 Total Results
Displaying 141-150 of 373
Sort by:
Attacker Value
Unknown

CVE-2021-30154

Disclosure Date: April 06, 2021 (last updated February 22, 2025)
An issue was discovered in MediaWiki before 1.31.12 and 1.32.x through 1.35.x before 1.35.2. On Special:NewFiles, all the mediastatistics-header-* messages are output in HTML unescaped, leading to XSS.
Attacker Value
Unknown

CVE-2021-30158

Disclosure Date: April 06, 2021 (last updated February 22, 2025)
An issue was discovered in MediaWiki before 1.31.12 and 1.32.x through 1.35.x before 1.35.2. Blocked users are unable to use Special:ResetTokens. This has security relevance because a blocked user might have accidentally shared a token, or might know that a token has been compromised, and yet is not able to block any potential future use of the token by an unauthorized party.
Attacker Value
Unknown

CVE-2020-29005

Disclosure Date: January 29, 2021 (last updated February 22, 2025)
The API in the Push extension for MediaWiki through 1.35 used cleartext for ApiPush credentials, allowing for potential information disclosure.
Attacker Value
Unknown

CVE-2020-29004

Disclosure Date: January 29, 2021 (last updated February 22, 2025)
The API in the Push extension for MediaWiki through 1.35 did not require an edit token in ApiPushBase.php and therefore facilitated a CSRF attack.
Attacker Value
Unknown

CVE-2020-35626

Disclosure Date: December 21, 2020 (last updated February 22, 2025)
An issue was discovered in the PushToWatch extension for MediaWiki through 1.35.1. The primary form did not implement an anti-CSRF token and therefore was completely vulnerable to CSRF attacks against onSkinAddFooterLinks in PushToWatch.php.
Attacker Value
Unknown

CVE-2020-35623

Disclosure Date: December 21, 2020 (last updated February 22, 2025)
An issue was discovered in the CasAuth extension for MediaWiki through 1.35.1. Due to improper username validation, it allowed user impersonation with trivial manipulations of certain characters within a given username. An ordinary user may be able to login as a "bureaucrat user" who has a similar username, as demonstrated by usernames that differ only in (1) bidirectional override symbols or (2) blank space.
Attacker Value
Unknown

CVE-2020-35625

Disclosure Date: December 21, 2020 (last updated February 22, 2025)
An issue was discovered in the Widgets extension for MediaWiki through 1.35.1. Any user with the ability to edit pages within the Widgets namespace could call any static function within any class (defined within PHP or MediaWiki) via a crafted HTML comment, related to a Smarty template. For example, a person in the Widget Editors group could use \MediaWiki\Shell\Shell::command within a comment.
Attacker Value
Unknown

CVE-2020-35622

Disclosure Date: December 21, 2020 (last updated February 22, 2025)
An issue was discovered in the GlobalUsage extension for MediaWiki through 1.35.1. SpecialGlobalUsage.php calls WikiMap::makeForeignLink unsafely. The $page variable within the formatItem function was not being properly escaped, allowing for XSS under certain conditions.
Attacker Value
Unknown

CVE-2020-35624

Disclosure Date: December 21, 2020 (last updated February 22, 2025)
An issue was discovered in the SecurePoll extension for MediaWiki through 1.35.1. The non-admin vote list contains a full vote timestamp, which may provide unintended clues about how a voting process unfolded.
Attacker Value
Unknown

CVE-2020-35475

Disclosure Date: December 18, 2020 (last updated February 22, 2025)
In MediaWiki before 1.35.1, the messages userrights-expiry-current and userrights-expiry-none can contain raw HTML. XSS can happen when a user visits Special:UserRights but does not have rights to change all userrights, and the table on the left side has unchangeable groups in it. (The right column with the changeable groups is not affected and is escaped correctly.)