CVE-2024-25109

Source
https://cve.org/CVERecord?id=CVE-2024-25109
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-25109.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-25109
Aliases
  • GHSA-4jr2-jhfm-2r84
Published
2024-02-09T22:25:48.347Z
Modified
2025-11-30T11:30:33.795307Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N CVSS Calculator
Summary
Cross-Site Scripting in the extensions, settings, permissions and namespaces subpages of ManageWiki
Details

ManageWiki is a MediaWiki extension allowing users to manage wikis. Special:ManageWiki does not escape escape interface messages on the columns and help keys on the form descriptor. An attacker may exploit this and would have a cross site scripting attack vector. Exploiting this on-wiki requires the (editinterface) right. Users should apply the code changes in commits 886cc6b94, 2ef0f50880, and 6942e8b2c to resolve this vulnerability. There are no known workarounds for this vulnerability.

Database specific
{
    "cwe_ids": [
        "CWE-79"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/25xxx/CVE-2024-25109.json"
}
References

Affected packages

Git / github.com/miraheze/managewiki

Affected ranges

Type
GIT
Repo
https://github.com/miraheze/managewiki
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed
Fixed

Database specific

source

"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-25109.json"