CVE-2024-47812

Cross-site Scripting (XSS) on Special:RequestImportQueue when displaying request date in ImportDump

Description

ImportDump is an extension for mediawiki designed to automate user import requests. Anyone who can edit the interface strings of a wiki (typically administrators and interface admins) can embed XSS payloads in the messages for dates, and thus XSS anyone who views Special:RequestImportQueue. This issue has been patched in commit `d054b95` and all users are advised to apply this commit to their branch. Users unable to upgrade may either Prevent access to Special:RequestImportQueue on all wikis, except for the global wiki; and If an interface administrator (or equivalent) level protection is available (which is not provided by default) on the global wiki, protect the affected messages up to that level. This causes the XSS to be virtually useless as users with those rights can already edit Javascript pages. Or Prevent access to Special:RequestImportQueue altogether.

Category

6.0
CVSS
Severity: Medium
CVSS 3.1 •
EPSS 0.21%
Affected: miraheze ImportDump
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2024-47812?
CVE-2024-47812 has been scored as a medium severity vulnerability.
How to fix CVE-2024-47812?
To fix CVE-2024-47812, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2024-47812 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2024-47812 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2024-47812?
CVE-2024-47812 affects miraheze ImportDump.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.