Show filters
381 Total Results
Displaying 151-160 of 381
Sort by:
Attacker Value
Unknown

CVE-2020-35479

Disclosure Date: December 18, 2020 (last updated February 22, 2025)
MediaWiki before 1.35.1 allows XSS via BlockLogFormatter.php. Language::translateBlockExpiry itself does not escape in all code paths. For example, the return of Language::userTimeAndDate is is always unsafe for HTML in a month value. This affects MediaWiki 1.12.0 and later.
Attacker Value
Unknown

CVE-2020-29002

Disclosure Date: November 24, 2020 (last updated February 22, 2025)
includes/CologneBlueTemplate.php in the CologneBlue skin for MediaWiki through 1.35 allows XSS via a qbfind message supplied by an administrator.
Attacker Value
Unknown

CVE-2020-29003

Disclosure Date: November 24, 2020 (last updated February 22, 2025)
The PollNY extension for MediaWiki through 1.35 allows XSS via an answer option for a poll question, entered during Special:CreatePoll or Special:UpdatePoll.
Attacker Value
Unknown

CVE-2020-27957

Disclosure Date: October 28, 2020 (last updated February 22, 2025)
The RandomGameUnit extension for MediaWiki through 1.35 was not properly escaping various title-related data. When certain varieties of games were created within MediaWiki, their names or titles could be manipulated to generate stored XSS within the RandomGameUnit extension.
Attacker Value
Unknown

CVE-2020-27620

Disclosure Date: October 22, 2020 (last updated February 22, 2025)
The Cosmos Skin for MediaWiki through 1.35.0 has stored XSS because MediaWiki messages were not being properly escaped. This is related to wfMessage and Html::rawElement, as demonstrated by CosmosSocialProfile::getUserGroups.
Attacker Value
Unknown

CVE-2020-25814

Disclosure Date: September 27, 2020 (last updated February 22, 2025)
In MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4, XSS related to jQuery can occur. The attacker creates a message with [javascript:payload xss] and turns it into a jQuery object with mw.message().parse(). The expected result is that the jQuery object does not contain an <a> tag (or it does not have a href attribute, or it's empty, etc.). The actual result is that the object contains an <a href ="javascript... that executes when clicked.
Attacker Value
Unknown

CVE-2020-25815

Disclosure Date: September 27, 2020 (last updated February 22, 2025)
An issue was discovered in MediaWiki 1.32.x through 1.34.x before 1.34.4. LogEventList::getFiltersDesc is insecurely using message text to build options names for an HTML multi-select field. The relevant code should use escaped() instead of text().
Attacker Value
Unknown

CVE-2020-25827

Disclosure Date: September 27, 2020 (last updated February 22, 2025)
An issue was discovered in the OATHAuth extension in MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4. For Wikis using OATHAuth on a farm/cluster (such as via CentralAuth), rate limiting of OATH tokens is only done on a single site level. Thus, multiple requests can be made across many wikis/sites concurrently.
Attacker Value
Unknown

CVE-2020-25828

Disclosure Date: September 27, 2020 (last updated February 22, 2025)
An issue was discovered in MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4. The non-jqueryMsg version of mw.message().parse() doesn't escape HTML. This affects both message contents (which are generally safe) and the parameters (which can be based on user input). (When jqueryMsg is loaded, it correctly accepts only whitelisted tags in message contents, and escapes all parameters. Situations with an unloaded jqueryMsg are rare in practice, but can for example occur for Special:SpecialPages on a wiki with no extensions installed.)
Attacker Value
Unknown

CVE-2020-25869

Disclosure Date: September 27, 2020 (last updated February 22, 2025)
An information leak was discovered in MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4. Handling of actor ID does not necessarily use the correct database or correct wiki.