- Description
- User-controlled inputs are improperly escaped in: * VotePage.php (poll option input) * ResultPage::getPagesTab() and getErrorsTab() (user-controllable page names) This allows attackers to inject JavaScript and compromise user sessions under certain conditions. This issue affects Mediawiki - SecurePoll extension: from 1.39.X before 1.39.13, from 1.42.X before 1.42.7, from 1.43.X before 1.43.2.
- Source
- c4f26cc8-17ff-4c99-b5e2-38fc1793eacc
- NVD status
- Awaiting Analysis
CVSS 3.1
- Type
- Secondary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
- c4f26cc8-17ff-4c99-b5e2-38fc1793eacc
- CWE-79
- Hype score
- Not currently trending
CVE-2025-53484 Cross-Site Scripting in Mediawiki SecurePoll Extension Across Mul... https://t.co/jv3N1iFas2 Customizable Vulnerability Alerts: https://t.co/U7998fz7yk
@VulmonFeeds
4 Jul 2025
1 Impression
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-53484 User-controlled inputs are improperly escaped in: * VotePage.php (poll option input) * ResultPage::getPagesTab() and getErrorsTab() (user-controllable … https://t.co/EmHJwZIPko
@CVEnew
4 Jul 2025
560 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes