
Cloud Vulnerability DB
A community-led vulnerabilities database
MediaWiki before 1.23.16, 1.24.x through 1.27.x before 1.27.2, and 1.28.x before 1.28.1 contains a vulnerability that allows remote attackers to discover the IP addresses of Wiki visitors via a style="background-image: attr(title url);" attack within a DIV element that has an attacker-controlled URL in the title attribute (Wikimedia Phabricator).
The vulnerability exists in the CSS sanitizer functionality. The sanitizer rejects any inline CSS with "url(" to prevent web bugs, but a proposed update to attr() would allow circumvention of this check. The attack involves creating a span with a URL as title, where the inline CSS then adds a background image defined by that title interpreted as URL, enabling image loading from any domain (Wikimedia Phabricator).
If exploited, this vulnerability allows attackers to track Wiki visitors by discovering their IP addresses through web bug techniques. This represents a privacy concern as it enables unauthorized tracking of users visiting Wiki pages (Wikimedia Phabricator).
The issue was fixed in MediaWiki versions 1.23.16, 1.27.2, and 1.28.1. Users should upgrade to these versions or later to protect against this vulnerability. The fix involves rejecting CSS attr() with URL type in the sanitizer (Wikimedia Phabricator).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."