{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-02T20:18:20.261","vulnerabilities":[{"cve":{"id":"CVE-2025-43861","sourceIdentifier":"security-advisories@github.com","published":"2025-04-24T21:15:24.310","lastModified":"2025-09-19T15:41:02.120","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"ManageWiki is a MediaWiki extension allowing users to manage wikis. Prior to commit 2f177dc, ManageWiki is vulnerable to reflected or stored XSS in the review dialog. A logged-in attacker must change a form field to include a malicious payload. If that same user then opens the \"Review Changes\" dialog, the payload will be rendered and executed in the context of their own session. This issue has been patched in commit 2f177dc."},{"lang":"es","value":"ManageWiki es una extensión de MediaWiki que permite a los usuarios administrar wikis. Antes del commit 2f177dc, ManageWiki era vulnerable a XSS reflejado o almacenado en el diálogo de revisión. Un atacante con sesión iniciada debe modificar un campo de formulario para incluir una carga maliciosa. Si ese mismo usuario abre el diálogo \"Revisar cambios\", la carga se procesará y ejecutará en el contexto de su propia sesión. Este problema se ha corregido en el commit 2f177dc."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N","baseScore":4.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":1.3,"impactScore":2.7},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":2.7}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:miraheze:managewiki:*:*:*:*:*:*:*:*","versionEndExcluding":"2025-04-24","matchCriteriaId":"EA968A65-2DAE-4379-8782-EAF9FAAE4F4F"}]}]}],"references":[{"url":"https://github.com/miraheze/ManageWiki/commit/2f177dc83b28b727613215b835d4036cb179e4ab","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/miraheze/ManageWiki/security/advisories/GHSA-859x-46h8-vcrv","source":"security-advisories@github.com","tags":["Exploit","Patch","Vendor Advisory"]}]}}]}