While fixing the tests for https://gerrit.wikimedia.org/r/c/mediawiki/extensions/CheckUser/+/1193254, which is the patch for T402077, I noticed that there is another i18n XSS vulnerability caused by passing a list of HTML strings to mw.language.listToText and using the result as raw HTML.
mw.language.listToText is supposed to be used for text and not HTML, as the return value contains the unsanitized system messages and, word-separator and comma-separator:
https://gerrit.wikimedia.org/g/mediawiki/core/+/ffd25a424f9fc8cbb32a403969e473da85c4389f/resources/src/mediawiki.language/mediawiki.language.js#147
The reproduction steps should be the same as described in T402077, but instead of using uselang=x-xss or editing MediaWiki:checkuser-tempaccount-specialblock-ips, the messages and, word-separator or comma-separator have to be edited to <img src="" onerror="alert(1)">, which should cause an alert.