CVE-2024-47781

Source
https://cve.org/CVERecord?id=CVE-2024-47781
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-47781.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-47781
Aliases
  • GHSA-h527-jh77-5g7j
Published
2024-10-07T21:30:23.058Z
Modified
2025-12-01T13:44:15.710553Z
Severity
  • 5.3 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N CVSS Calculator
Summary
Cross-site Scripting (XSS) in Special:RequestWikiQueue when displaying sitename in CreateWiki
Details

CreateWiki is an extension used at Miraheze for requesting & creating wikis. The name of requested wikis is not escaped on Special:RequestWikiQueue, so a user can insert arbitrary HTML that is displayed in the request wiki queue when requesting a wiki. If a wiki creator comes across the XSS payload, their user session can be abused to retrieve deleted wiki requests, which typically contains private information. Likewise, this can also be abused on those with the ability to suppress requests to view sensitive information. This issue has been patched with commit 693a220 and all users are advised to apply the patch. Users unable to upgrade should disable Javascript and/or prevent access to the vulnerable page (Special:RequestWikiQueue).

Database specific
{
    "cwe_ids": [
        "CWE-79"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/47xxx/CVE-2024-47781.json",
    "cna_assigner": "GitHub_M"
}
References

Affected packages

Git / github.com/miraheze/createwiki

Affected ranges

Type
GIT
Repo
https://github.com/miraheze/createwiki
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-47781.json"