{"id":79990,"date":"2025-10-02T00:33:14","date_gmt":"2025-10-02T00:33:14","guid":{"rendered":""},"modified":"2025-10-03T15:49:42","modified_gmt":"2025-10-03T21:49:42","slug":"cve-2025-59839-cross-site-scripting-vulnerability-in-embedvideo-extension-for-mediawiki","status":"publish","type":"post","link":"https:\/\/www.ameeba.com\/blog\/cve-2025-59839-cross-site-scripting-vulnerability-in-embedvideo-extension-for-mediawiki\/","title":{"rendered":"<strong>CVE-2025-59839: Cross-Site Scripting Vulnerability in EmbedVideo Extension for MediaWiki<\/strong>"},"content":{"rendered":"<p><strong>Overview<\/strong><\/p>\n<p>CVE-2025-59839 is a severe vulnerability affecting the EmbedVideo Extension in MediaWiki&#8217;s versions 4.0.0 and prior. This extension is widely used for embedding video clips from various video sharing services into MediaWiki pages. The <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-47130-integer-underflow-vulnerability-in-adobe-framemaker-leads-to-arbitrary-code-execution\/\"  data-wpil-monitor-id=\"87205\">vulnerability allows an attacker to add arbitrary<\/a> attributes to an HTML element, leading to a stored Cross-Site Scripting (XSS) attack through wikitext. This vulnerability is of grave concern as it opens the <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-48539-critical-out-of-bounds-read-in-acl-arbiter-cc-leading-to-potential-system-compromise\/\"  data-wpil-monitor-id=\"87349\">potential for system<\/a> compromise and data leakage, which could have dire consequences for any organization using the affected versions of the EmbedVideo Extension.<\/p>\n<p><strong>Vulnerability Summary<\/strong><\/p>\n<p>CVE ID: CVE-2025-59839<br \/>\nSeverity: High (8.6 CVSS Score)<br \/>\nAttack Vector: Network<br \/>\nPrivileges Required: None<br \/>\nUser Interaction: Required<br \/>\nImpact: Potential <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-49401-critical-deserialization-of-untrusted-data-vulnerability-in-expresstech-systems-quiz-and-survey-master\/\"  data-wpil-monitor-id=\"87194\">system compromise or data<\/a> leakage<\/p>\n<p><strong>Affected Products<\/strong><\/p><div id=\"ameeb-947583957\" class=\"ameeb-content-2 ameeb-entity-placement\"><div style=\"border-left: 4px solid #555; padding-left: 20px; margin: 48px 0; font-family: Roboto, sans-serif; color: #ffffff; line-height: 1.6; max-width: 700px;\">\r\n  <h2 style=\"margin-top: 0; font-size: 20px; font-weight: 600; display: flex; align-items: center;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"display: inline-flex; align-items: center; margin-right: 8px;\">\r\n      <img decoding=\"async\" src=\"https:\/\/www.ameeba.com\/blog\/wp-content\/uploads\/2025\/10\/Best-App-icon-Ameeba.png\" alt=\"Ameeba Chat Icon\" style=\"width: 40px; height: 40px;\" \/>\r\n    <\/a>\r\n    A new way to communicate\r\n  <\/h2>\r\n\r\n  <p style=\"margin-bottom: 12px;\">\r\n    Ameeba Chat is built on encrypted identity, not personal profiles.\r\n  <\/p>\r\n\r\n  <p style=\"margin-bottom: 16px;\">\r\n    Message, call, share files, and coordinate with identities kept separate.\r\n  <\/p>\r\n\r\n  <ul style=\"list-style: none; padding-left: 0; margin-bottom: 20px;\">\r\n    <li>\u2022 Encrypted identity<\/li>\r\n    <li>\u2022 Ameeba Chat authenticates access<\/li>\r\n    <li>\u2022 Aliases and categories<\/li>\r\n    <li>\u2022 End-to-end encrypted chat, calls, and files<\/li>\r\n    <li>\u2022 Secure notes for sensitive information<\/li>\r\n  <\/ul>\r\n\r\n  <p style=\"font-style: italic; font-weight: 600; margin-bottom: 24px;\">\r\n    Private communication, rethought.\r\n  <\/p>\r\n\r\n  <div style=\"display: flex; flex-wrap: wrap; gap: 12px;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\/download\" style=\"background-color: #ffffff; color: #000000; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Download Ameeba Chat<\/a>\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"border: 1px solid #ffffff; color: #ffffff; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Learn More<\/a>\r\n  <\/div>\r\n<\/div>\r\n<\/div>\n<p>Product | Affected Versions<\/p>\n<p><a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-53369-mediawiki-short-description-extension-vulnerability\/\"  data-wpil-monitor-id=\"91419\">MediaWiki EmbedVideo Extension<\/a> | 4.0.0 and prior<\/p>\n<p><strong>How the Exploit Works<\/strong><\/p>\n<p>The <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-48530-remote-code-execution-vulnerability-due-to-incorrect-bounds-checking\/\"  data-wpil-monitor-id=\"87398\">vulnerability arises due<\/a> to the EmbedVideo Extension&#8217;s ability to add arbitrary attributes to an HTML element through wikitext. An attacker can exploit this vulnerability by crafting malicious wikitext that includes harmful attributes. When a user views a page containing this malicious wikitext, the harmful attributes are executed in the user&#8217;s browser, leading to a <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-57731-stored-xss-vulnerability-in-jetbrains-youtrack\/\"  data-wpil-monitor-id=\"88583\">stored XSS<\/a> attack. This could allow the attacker to execute arbitrary scripts in the context of the user&#8217;s session, <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2024-36342-heap-overflow-vulnerability-in-gpu-driver-leading-to-potential-arbitrary-code-execution\/\"  data-wpil-monitor-id=\"87466\">potentially leading<\/a> to unauthorised actions or data theft.<\/p>\n<p><strong>Conceptual Example Code<\/strong><\/p><div id=\"ameeb-3838649366\" class=\"ameeb-content ameeb-entity-placement\"><div class=\"poptin-embedded\" data-id=\"f6b387694f681\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n<\/div>\n<p>Below is a conceptual example of how the vulnerability might be exploited through a crafted wikitext:<\/p>\n<pre><code class=\"\" data-line=\"\">{{#ev:youtube|&lt;img src=x onerror=alert(&#039;XSS&#039;) \/&gt;}}<\/code><\/pre>\n<p>This wikitext attempts to embed a YouTube video, but it includes a malicious &#8216;onerror&#8217; attribute in an image tag. If the image fails to load, the &#8216;onerror&#8217; attribute triggers, executing the JavaScript alert function and displaying a message box with the text &#8216;XSS&#8217;. In a real-world attack, this benign alert could be replaced with a more malicious script, such as one that steals the user&#8217;s session cookies.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview CVE-2025-59839 is a severe vulnerability affecting the EmbedVideo Extension in MediaWiki&#8217;s versions 4.0.0 and prior. This extension is widely used for embedding video clips from various video sharing services into MediaWiki pages. The vulnerability allows an attacker to add arbitrary attributes to an HTML element, leading to a stored Cross-Site Scripting (XSS) attack through [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"footnotes":""},"categories":[1],"tags":[],"vendor":[],"product":[],"attack_vector":[81],"asset_type":[],"severity":[],"exploit_status":[],"class_list":["post-79990","post","type-post","status-publish","format-standard","hentry","category-uncategorized","attack_vector-xss"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/79990","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/comments?post=79990"}],"version-history":[{"count":7,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/79990\/revisions"}],"predecessor-version":[{"id":84526,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/79990\/revisions\/84526"}],"wp:attachment":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/media?parent=79990"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/categories?post=79990"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/tags?post=79990"},{"taxonomy":"vendor","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/vendor?post=79990"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/product?post=79990"},{"taxonomy":"attack_vector","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/attack_vector?post=79990"},{"taxonomy":"asset_type","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/asset_type?post=79990"},{"taxonomy":"severity","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/severity?post=79990"},{"taxonomy":"exploit_status","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/exploit_status?post=79990"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}