Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Wikimedia Foundation | MediaWiki | * ~ 1.39.14, 1.43.4, 1.44.1 | - | |
| Wikimedia Foundation | Parsoid | * ~ 0.16.6, 0.20.4, 0.21.1 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2025-61638 PoC | https://github.com/gui-ying233/CVE-2025-61638 | POC Details |
No public POC found.
Login to generate AI POC| CVE-2025-61635 | Add rate limiting to ApiFancyCaptchaReload | |
| CVE-2025-61642 | Stored XSS through system messages provided to CodexHtmlForms | |
| CVE-2025-61644 | i18n XSS through Special:Watchlist | |
| CVE-2025-61643 | EventStreams publishes suppressed recent change entries that are suppressed from their cre | |
| CVE-2025-61641 | API list=allpages with maxsize is making really slow queries | |
| CVE-2025-61634 | HTML rest endpoint needs PoolCounter and proper parser cache check | |
| CVE-2025-61640 | Stored XSS through system messages in Special:RecentChangesLinked (MW Core) | |
| CVE-2025-61637 | Stored XSS through system messages in MW Core | |
| CVE-2025-61639 | Suppressed blocked IP is visible in Special:BlockList, RC, and other places | |
| CVE-2025-61636 | Codex Special:Block vulnerable to message key XSS | |
| CVE-2025-6594 | XSS in Special:ApiSandbox | |
| CVE-2025-6591 | HTML injection in API action=feedcontributions output from i18n message | |
| CVE-2025-6595 | MediaWiki 安全漏洞 | |
| CVE-2025-6592 | Creating a permanent account from a temporary account associates temp username and IP addr | |
| CVE-2025-6927 | Autoblocks from global account suppressions are publicly visible | |
| CVE-2025-6597 | MediaWiki should not consider autocreation as login for the purposes of security reauthent | |
| CVE-2025-6596 | Vector inserts portlet labels as HTML, allowing for stored XSS through system messages | |
| CVE-2025-6593 | "{{SITENAME}} registered email address has been changed" email sent to unverified email ad | |
| CVE-2025-6589 | With MultiBlocks enabled and a user who is suppressed via a MultiBlock, a user without 'hi | |
| CVE-2025-6590 | Complete content leak of private wikis due to PasswordReset Wikitext injection in error me |
No comments yet