CVE-2020-29007
Homebrew vulnerability analysis and mitigation

Overview

The Score extension through 0.3.0 for MediaWiki contained a remote code execution vulnerability (CVE-2020-29007) due to improper sandboxing of the GNU LilyPond executable. The vulnerability allowed any user with article editing privileges, including potentially unauthenticated anonymous users, to execute arbitrary Scheme or shell code by using crafted {{Image}} data to generate musical scores containing malicious code (NIST, Seqred Advisory).

Technical details

The vulnerability existed because the Score extension executed the LilyPond binary without the -dsafe option, allowing arbitrary Guile Scheme code embedded within LilyPond markup to be executed, including code that could interact with the operating system shell. The vulnerability was assigned a CVSS v3.1 base score of 9.8 CRITICAL (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) due to its potential for remote exploitation without authentication (NIST).

Impact

The vulnerability allowed attackers to execute arbitrary commands within the context of the webserver process, enabling them to explore the filesystem, read system files like /etc/passwd, and execute shell commands. This could potentially lead to complete system compromise (Seqred Advisory, Wikimedia Advisory).

Mitigation and workarounds

Initially, Wikimedia disabled the Score extension completely in July 2020. In August 2021, Score was re-enabled after implementing several security measures including: isolating LilyPond using Shellbox, requiring recent versions of LilyPond (2.22.0+) with security fixes, and maintaining safe mode as an additional layer of defense. For non-Wikimedia wikis, it is recommended to only enable Score if all users with editing privileges are trusted, or if proper Shellbox containment is implemented (Wikimedia Advisory).

Community reactions

The vulnerability led to significant changes in how MediaWiki handles external binaries, with Wikimedia Foundation seeking to fund improvements to LilyPond's safe mode implementation. The discovery also prompted security reviews of similar services like Lilybin and Hacklily that were found to be running LilyPond in unsafe mode (Wikimedia Advisory).

Additional resources


SourceThis report was generated using AI

Related Homebrew vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-58360CRITICAL9.8
  • JavaJava
  • org.geoserver.web:gs-web-app
NoYesNov 25, 2025
CVE-2025-65085HIGH8.4
  • NixOSNixOS
  • cobalt
NoNoNov 25, 2025
CVE-2025-65084HIGH8.4
  • NixOSNixOS
  • argon
NoNoNov 25, 2025
CVE-2025-59789HIGH7.5
  • HomebrewHomebrew
  • brpc
NoYesDec 01, 2025
CVE-2025-21621MEDIUM6.1
  • JavaJava
  • geoserver
NoYesNov 25, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management