The MsUpload extension for MediaWiki is vulnerable to stored XSS via the msu-continue system message, which is inserted into the DOM without proper sanitization. The vulnerability occurs in the file upload UI when the same filename is uploaded twice.
This issue affects Mediawiki - MsUpload extension: from 1.39.X before 1.39.13, from 1.42.X before 1.42.7, from 1.43.X before 1.43.2.
Metrics
Affected Vendors & Products
References
History
Thu, 10 Jul 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Tue, 08 Jul 2025 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The MsUpload extension for MediaWiki is vulnerable to stored XSS via the msu-continue system message, which is inserted into the DOM without proper sanitization. The vulnerability occurs in the file upload UI when the same filename is uploaded twice. This issue affects Mediawiki - MsUpload extension: from 1.39.X before 1.39.13, from 1.42.X before 1.42.7, from 1.43.X before 1.43.2. | |
Title | MsUpload: Stored Cross-Site Scripting (XSS) via unsanitized msu-continue system message | |
Weaknesses | CWE-79 | |
References |
|

Status: PUBLISHED
Assigner: wikimedia-foundation
Published: 2025-07-08T17:22:35.364Z
Updated: 2025-07-10T13:19:38.972Z
Reserved: 2025-07-08T17:18:05.309Z
Link: CVE-2025-7362

Updated: 2025-07-10T13:19:35.707Z

Status : Awaiting Analysis
Published: 2025-07-08T18:15:46.797
Modified: 2025-07-10T14:15:26.927
Link: CVE-2025-7362

No data.