vulnerability
MediaWiki: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (CVE-2021-30157)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:M/Au:N/C:N/I:P/A:N) | Apr 6, 2021 | Apr 12, 2021 | Apr 7, 2026 |
Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
Published
Apr 6, 2021
Added
Apr 12, 2021
Modified
Apr 7, 2026
Description
An issue was discovered in MediaWiki before 1.31.12 and 1.32.x through 1.35.x before 1.35.2. On ChangesList special pages such as Special:RecentChanges and Special:Watchlist, some of the rcfilters-filter-* label messages are output in HTML unescaped, leading to XSS.
Solutions
mediawiki-upgrade-1_31_12mediawiki-upgrade-1_35_2
References
- CVE-2021-30157
- https://attackerkb.com/topics/CVE-2021-30157
- CWE-79
- EUVD-EUVD-2021-17093
- https://euvd.enisa.europa.eu/vulnerability/EUVD-2021-17093
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/26UJGHF7LJDOCQN6A3Z4PM7PYRKENJHE/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2OMSV7B2TCFBOCICN3B4SMQP5HVRJQIT/
- https://phabricator.wikimedia.org/T278058
- https://security.gentoo.org/glsa/202107-40
- https://www.debian.org/security/2021/dsa-4889
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.