Improper Encoding or Escaping of Output due to magic word replacement in ParserAfterTidy vulnerability in The Wikimedia Foundation Mediawiki - ApprovedRevs Extension allows Input Data Manipulation.This issue affects Mediawiki - ApprovedRevs Extension: 1.45, 1.44, 1.43, 1.39.
References
| Link | Resource |
|---|---|
| https://gerrit.wikimedia.org/r/q/Iee1bf1cbc8a519899e7f9dde508856bd4e5a5d2a | Patch |
| https://phabricator.wikimedia.org/T412068 | Exploit Issue Tracking |
| https://phabricator.wikimedia.org/T412068 | Exploit Issue Tracking |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2026-01-09 00:15
Updated : 2026-02-12 17:50
NVD link : CVE-2026-22712
Mitre link : CVE-2026-22712
CVE.ORG link : CVE-2026-22712
JSON object : View
Products Affected
wikiworks
- approved_revs
CWE
CWE-116
Improper Encoding or Escaping of Output
