
Cloud Vulnerability DB
A community-led vulnerabilities database
An issue was discovered in the CommentBox extension for MediaWiki through 1.35.2. The vulnerability allows malicious actors to introduce XSS (Cross-Site Scripting) payloads into various layers through crafted configuration variables (CVE Database, MITRE CVE).
The vulnerability has been assigned a CVSS v3.1 Base Score of 5.4 (MEDIUM) with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N. The CVSS v2.0 score is 3.5 (LOW) with vector (AV:N/AC:M/Au:S/C:N/I:P/A:N). The vulnerability is classified as CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (CVE Database).
The vulnerability allows attackers to execute cross-site scripting attacks through configuration variables, potentially leading to unauthorized access to sensitive information and manipulation of web content. The impact is considered medium severity due to the requirement of user interaction and limited privileges needed for exploitation (CVE Database).
The vulnerability has been addressed in MediaWiki's CommentBox extension. Users should update to a version newer than 1.35.2 to mitigate this security risk (CVE Database).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."