User Input Injection Vulnerability in Mediawiki SecurePoll Extension
CVE-2025-53484

9.8CRITICAL

Key Information:

Vendor
CVE Published:
4 July 2025

Badges

👾 Exploit Exists📰 News Worthy

What is CVE-2025-53484?

The SecurePoll extension for Mediawiki is affected by a user input injection vulnerability due to improperly escaped user-controlled inputs. Specifically, attackers can exploit user input in the VotePage.php file for poll options and in the ResultPage methods, getPagesTab() and getErrorsTab(), where user-controlled page names are used without proper validation. This allows potential malicious actors to inject JavaScript code, leading to compromised user sessions under specific conditions. Users of affected versions should take immediate action to mitigate this risk.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Mediawiki - SecurePoll extension 1.39.x < 1.39.13

Mediawiki - SecurePoll extension 1.42.x < 1.42.7

Mediawiki - SecurePoll extension 1.43.x < 1.43.2

News Articles

CVE-2025-53484: Critical JavaScript Injection Vulnerability in Mediawiki’s SecurePoll Extension - Cybersecurity Exploit Tracker by Ameeba

Overview This blog post covers the critical vulnerability CVE-2025-53484, which affects the SecurePoll extension of the widely used Mediawiki software. This vulnerability permits malicious actors to inject JavaScript into user-controlled inputs, potentially compromising user sessions. This is especi...

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 👾

    Exploit known to exist

  • đź“°

    First article discovered by ameeba.com

  • Vulnerability published

  • Vulnerability Reserved

.