
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2025-49577 affects the Citizen MediaWiki skin, a component that makes extensions part of a cohesive experience. The vulnerability was discovered and disclosed on June 11, 2025, and involves various preferences messages being inserted into raw HTML, allowing users with message editing privileges to insert arbitrary HTML into the DOM. The issue has been fixed in version 3.3.1 (GitHub Advisory, NVD).
The vulnerability is classified as a Stored Cross-Site Scripting (XSS) issue, identified as CWE-79. It has a CVSS v3.1 score of 6.5 (Medium), with the vector string CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N. The technical root cause involves the innerHtml of the label div being set to the textContent of the label, which effectively unsanitizes system messages in the preferences menu heading (Wiz).
The vulnerability allows attackers with message editing privileges to achieve high levels of confidentiality and integrity impact through arbitrary HTML injection into the DOM. However, there is no impact on system availability, and the scope remains unchanged, meaning the vulnerability cannot affect resources beyond its security scope (GitHub Advisory).
The vulnerability has been patched in version 3.3.1 with commit 93c36ac778397e0e7c46cf7adb1e5d848265f1bd. The fix involves proper escaping of menu headings, user registration dates, and various other message handling improvements (GitHub Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."