Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-6596— Vector inserts portlet labels as HTML, allowing for stored XSS through system messages

EPSS 0.02% · P6
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-6596

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Vector inserts portlet labels as HTML, allowing for stored XSS through system messages
Source: NVD (National Vulnerability Database)
Vulnerability Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Wikimedia Foundation Vector. This vulnerability is associated with program files resources/skins.Vector.Js/portlets.Js, resources/skins.Vector.Legacy.Js/portlets.Js. This issue affects Vector: from >= 1.40.0 before 1.42.7, 1.43.2, 1.44.0.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
在Web页面生成时对输入的转义处理不恰当(跨站脚本)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Wikimedia Vector 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Wikimedia Vector是Wikimedia基金会的一个桌面端界面外观。 Wikimedia Vector存在安全漏洞,该漏洞源于对网页生成期间输入的中和不当,可能导致跨站脚本。以下版本受到影响:1.40.0至1.42.7之前版本、1.43.2版本和1.44.0版本。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Wikimedia FoundationVector >= 1.40.0 ~ 1.42.7, 1.43.2, 1.44.0 -

II. Public POCs for CVE-2025-6596

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-6596

登录查看更多情报信息。

Same Patch Batch · Wikimedia Foundation · 2026-02-02 · 21 CVEs total

CVE-2025-61636Codex Special:Block vulnerable to message key XSS
CVE-2025-61642Stored XSS through system messages provided to CodexHtmlForms
CVE-2025-61644i18n XSS through Special:Watchlist
CVE-2025-61643EventStreams publishes suppressed recent change entries that are suppressed from their cre
CVE-2025-61641API list=allpages with maxsize is making really slow queries
CVE-2025-61638Sanitizer::validateAttributes data-XSS
CVE-2025-61634HTML rest endpoint needs PoolCounter and proper parser cache check
CVE-2025-61640Stored XSS through system messages in Special:RecentChangesLinked (MW Core)
CVE-2025-61637Stored XSS through system messages in MW Core
CVE-2025-61639Suppressed blocked IP is visible in Special:BlockList, RC, and other places
CVE-2025-6594XSS in Special:ApiSandbox
CVE-2025-61635Add rate limiting to ApiFancyCaptchaReload
CVE-2025-6591HTML injection in API action=feedcontributions output from i18n message
CVE-2025-6595MediaWiki 安全漏洞
CVE-2025-6592Creating a permanent account from a temporary account associates temp username and IP addr
CVE-2025-6927Autoblocks from global account suppressions are publicly visible
CVE-2025-6597MediaWiki should not consider autocreation as login for the purposes of security reauthent
CVE-2025-6593"{{SITENAME}} registered email address has been changed" email sent to unverified email ad
CVE-2025-6589With MultiBlocks enabled and a user who is suppressed via a MultiBlock, a user without 'hi
CVE-2025-6590Complete content leak of private wikis due to PasswordReset Wikitext injection in error me

IV. Related Vulnerabilities

V. Comments for CVE-2025-6596

No comments yet


Leave a comment