We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-53093

TabberNeue vulnerable to Stored XSS through wikitext



Description

TabberNeue is a MediaWiki extension that allows the wiki to create tabs. Starting in version 3.0.0 and prior to version 3.1.1, any user can insert arbitrary HTMLinto the DOM by inserting a payload into any allowed attribute of the `<tabber>` tag. Version 3.1.1 contains a patch for the bug.

Reserved 2025-06-25 | Published 2025-06-27 | Updated 2025-06-27 | Assigner GitHub_M


HIGH: 8.6CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)

Product status

>= 3.0.0, < 3.1.1
affected

References

github.com/...erNeue/security/advisories/GHSA-jfj7-249r-7j2m

github.com/...ommit/4cdf217ef96da74a1503d1dd0bb0ed898fc2a612

github.com/...ommit/62ce0fcdf32bd3cfa77f92ff6b940459a14315fa

github.com/...9a/includes/Components/TabberComponentTabs.php

github.com/...c4128e7921841f68230be4059a/includes/Tabber.php

github.com/...f68230be4059a/includes/templates/Tabs.mustache

cve.org (CVE-2025-53093)

nvd.nist.gov (CVE-2025-53093)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-53093

Support options

Helpdesk Chat, Email, Knowledgebase