Description
Improper neutralization of input during web page generation ('cross-site scripting') vulnerability in The Wikimedia Foundation Mediawiki - CampaignEvents Extension allows Cross-Site Scripting (XSS). This issue was remediated only on the `master` branch.
Published: 2026-04-07
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting
Action: Apply patch
AI Analysis

Impact

Proper handling of user input is essential for safe web page rendering. The CampaignEvents extension fails to neutralize characters used in localized wiki names, allowing injected code to appear in the output HTML. When a victim’s browser renders the impacted page, the injected code is executed in that user’s context. The nature of the vulnerability permits the execution of arbitrary scripts in the browser running the affected page.

Affected Systems

The bug resides in the CampaignEvents extension of the MediaWiki platform maintained by the Wikimedia Foundation. No individual versions are cited, but the fix was applied only on the master branch; therefore, all releases built from older baselines remain affected until the updated code is deployed.

Risk and Exploitability

The CVSS base score of 6.9 signals a moderate severity level. An EPSS score of less than 1 % indicates a low probability of exploitation in the wild, and the defect is not yet listed in the CISA KEV catalog. The likely attack path involves an attacker supplying a malicious string in a wiki name field that is subsequently incorporated into a web page for other users. Existence of this vector requires that the manipulated field be accessible to non‑trusted users, which raises the risk profile for sites that allow open editing of wiki names but mitigates it for tightly controlled deployments.

Generated by OpenCVE AI on April 8, 2026 at 23:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Deploy the patched release of the CampaignEvents extension from the master branch or an official release that includes the fix.

Generated by OpenCVE AI on April 8, 2026 at 23:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 09 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
First Time appeared Wikimedia
Wikimedia mediawiki-campaignevents Extension
Vendors & Products Wikimedia
Wikimedia mediawiki-campaignevents Extension

Wed, 08 Apr 2026 22:30:00 +0000

Type Values Removed Values Added
Description Improper neutralization of input during web page generation ('cross-site scripting') vulnerability in The Wikimedia Foundation Mediawiki - CampaignEvents Extension allows Cross-Site Scripting (XSS).This issue affects Mediawiki - CampaignEvents Extension: 1.43.7, 1.44.4, 1.45.2. Improper neutralization of input during web page generation ('cross-site scripting') vulnerability in The Wikimedia Foundation Mediawiki - CampaignEvents Extension allows Cross-Site Scripting (XSS). This issue was remediated only on the `master` branch.

Wed, 08 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 22:30:00 +0000

Type Values Removed Values Added
Description Improper neutralization of input during web page generation ('cross-site scripting') vulnerability in The Wikimedia Foundation Mediawiki - CampaignEvents Extension allows Cross-Site Scripting (XSS).This issue affects Mediawiki - CampaignEvents Extension: 1.43.7, 1.44.4, 1.45.2.
Title XSS-via-i18n in localised wiki names
Weaknesses CWE-79
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L'}


Subscriptions

Wikimedia Mediawiki-campaignevents Extension
cve-icon MITRE

Status: PUBLISHED

Assigner: wikimedia-foundation

Published:

Updated: 2026-04-08T22:06:48.795Z

Reserved: 2026-04-07T21:25:36.589Z

Link: CVE-2026-39935

cve-icon Vulnrichment

Updated: 2026-04-08T14:05:14.472Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-07T23:16:27.380

Modified: 2026-04-08T23:16:58.860

Link: CVE-2026-39935

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-09T08:28:35Z

Weaknesses