{"uuid": "251bf25c-412e-49ef-856e-5f378fa2734d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-43861", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/13346", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-43861\n\ud83d\udd25 CVSS Score: 4.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: ManageWiki is a MediaWiki extension allowing users to manage wikis. Prior to commit 2f177dc, ManageWiki is vulnerable to reflected or stored XSS in the review dialog. A logged-in attacker must change a form field to include a malicious payload. If that same user then opens the \"Review Changes\" dialog, the payload will be rendered and executed in the context of their own session. This issue has been patched in commit 2f177dc.\n\ud83d\udccf Published: 2025-04-24T20:49:57.692Z\n\ud83d\udccf Modified: 2025-04-24T20:49:57.692Z\n\ud83d\udd17 References:\n1. https://github.com/miraheze/ManageWiki/security/advisories/GHSA-859x-46h8-vcrv\n2. https://github.com/miraheze/ManageWiki/commit/2f177dc83b28b727613215b835d4036cb179e4ab", "creation_timestamp": "2025-04-24T21:07:11.000000Z"}