Home

Description

User-controlled inputs are improperly escaped in: * VotePage.php (poll option input) * ResultPage::getPagesTab() and getErrorsTab() (user-controllable page names) This allows attackers to inject JavaScript and compromise user sessions under certain conditions. This issue affects Mediawiki - SecurePoll extension: from 1.39.X before 1.39.13, from 1.42.X before 1.42.7, from 1.43.X before 1.43.2.

PUBLISHED Reserved 2025-06-30 | Published 2025-07-04 | Updated 2025-07-08 | Assigner wikimedia-foundation

Problem types

CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')

Product status

Default status
unaffected

1.39.x (semver) before 1.39.13
affected

1.42.x (semver) before 1.42.7
affected

1.43.x (semver) before 1.43.2
affected

References

phabricator.wikimedia.org/T392341

gerrit.wikimedia.org/r/1149669

gerrit.wikimedia.org/r/1149655

cve.org (CVE-2025-53484)

nvd.nist.gov (CVE-2025-53484)

Download JSON