Vulnerability & Exploit Database

Back to search

MediaWiki SyntaxHighlight extension option injection vulnerability

This module exploits an option injection vulnerability in the SyntaxHighlight extension of MediaWiki. It tries to create & execute a PHP file in the document root. The USERNAME & PASSWORD options are only needed if the Wiki is configured as private. This vulnerability affects any MediaWiki installation with SyntaxHighlight version 2.0 installed & enabled. This extension ships with the AIO package of MediaWiki version 1.27.x & 1.28.x. A fix for this issue is included in MediaWiki version 1.28.2 and version 1.27.3.

Free Metasploit Download

Get your copy of the world's leading penetration testing tool

 Download Now

Module Name



  • Yorick Koster



  • Automatic Targeting


  • php


  • php



Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/multi/http/mediawiki_syntaxhighlight msf exploit(mediawiki_syntaxhighlight) > show targets ...targets... msf exploit(mediawiki_syntaxhighlight) > set TARGET <target-id> msf exploit(mediawiki_syntaxhighlight) > show options and set options... msf exploit(mediawiki_syntaxhighlight) > exploit