Page MenuHomePhabricator

Write and send supplementary release announcement for extensions and skins with security patches (1.43.7/1.44.4/1.45.2)
Closed, ResolvedPublic

Details

Other Assignee
ASanford-WMF
Related Changes in GitLab:
TitleReferenceAuthorSource BranchDest Branch
CVE JSON updatesrepos/security/wikimedia-cve-assignments!16mstylesapr-2026-supp-releasemain
Customize query in GitLab

Related Objects

Event Timeline

There are a very large number of changes, so older changes are hidden. Show Older Changes
Reedy added a parent task: Restricted Task.Dec 1 2025, 5:23 PM
Reedy added subscribers: mmartorana, Mstyles, sbassett.
Reedy renamed this task from Write and send supplementary release announcement for extensions and skins with security patches (1.43.7/1.44.4/1.45.1) to Write and send supplementary release announcement for extensions and skins with security patches (1.43.7/1.44.4/1.45.2).Dec 8 2025, 8:55 PM
sbassett changed the task status from Open to In Progress.Jan 20 2026, 7:00 PM
sbassett triaged this task as Low priority.
sbassett added a project: user-sbassett.
sbassett updated the task description. (Show Details)
sbassett updated the task description. (Show Details)

CVE/Backport Assignments

Start VulnEnd VulnAssignee
T414227 WikiForumT416402 Cargo@ASanford-WMF
T416502 WikiLoveGHSA-4h5r-8rjm-496r RenderBlocking@Mstyles

Note: post your email-formatted updates as comments below (see previous email: T397776#11291485)

I think we can remove T414227 as it doesn't seem like it's going to be fixed in time.

ReportIncident
+ (T414582, CVE-2026-5762) - ReportIncident DiscussionTools integration causes slow requests with occasional timeouts on large talk pages
https://gerrit.wikimedia.org/r/q/I05d7f65c57d9aa1b70cdb159c4291ac28c60b4dd

ProofreadPage
+ (T406088, CVE-2026-39838) - ProofreadPage improperly sanitizes multiline styles using Sanitizer::checkCSS
https://gerrit.wikimedia.org/r/q/Idd51e18479b32b7176b43ff74ca1c49d6bdd0628

Cargo
+ (T416271, CVE-2026-39839) - Stored XSS through URLs in Cargo's map format
https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Cargo/+/1237957
https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Cargo/+/1237977

Cargo
+ (T416368, CVE-2026-39840) - CSS injection in multiple Cargo display formats
https://gerrit.wikimedia.org/r/c/1237966

Cargo
+ (T416389, CVE-2026-39841) - Stored XSS through list fields on Cargo's page values and Special:CargoTables
https://gerrit.wikimedia.org/r/c/1237973

Cargo
+ (T416402, CVE-2026-39837) - Stored XSS through the dynamic table format in Cargo
https://gerrit.wikimedia.org/r/c/1237979

WikiLove
+(T416502, CVE-2026-22711) - Stored XSS through system messages in WikiLove
https://gerrit.wikimedia.org/r/q/Iab86209478a044504f5a6aea0d8c3d14f21c48b3

CentralAuth
+(T418122, CVE-2026-39937) - Global vanishing does not completely remove user email
https://gerrit.wikimedia.org/r/q/I0b72427fa329aee85841a2cb23dec3058edce85e

GlobalWatchlist
+(T418179, CVE-2026-39933) - Multiple XSS vulnerabilities
https://gerrit.wikimedia.org/r/q/I1fc7b7e1d234b0aaf9f7d782a65da1451577587e

GrowthExperiments
+(T418222, CVE-2026-39934) - ReassignMenteesJob runs as an infinite loop
https://gerrit.wikimedia.org/r/c/1243874

CampaignEvents
+(T418254, CVE-2026-39935) - XSS-via-i18n in localised wiki names
https://gerrit.wikimedia.org/r/c/1249320

Score
+(T419186, CVE-2026-39936) - Stored XSS due to usage of non-reserved data attributes
https://gerrit.wikimedia.org/r/q/I1fb2913bc32328cbc4ecd4b4ad4a4788fb98c56c

RenderBlocking
+(GHSA-4h5r-8rjm-496r, CVE-2026-30977) - Stored XSS in renderblocking-css with Inline Assets mode
https://github.com/lihaohong6/RenderBlocking/commit/096fc47dad9dca153b02cba3db81f412c87fb2be

Draft Email For Release - Please comment with any questions/concerns - otherwise this will be sent to the relevant mailing lists on Apr 8 2026
Subject: MediaWiki Extensions and Skins Security Release Supplement (1.43.7/1.44.4/1.45.2)

Greetings-

With the security/maintenance release of MediaWiki 1.43.7/1.44.4/1.45.2, we would also like to provide this supplementary announcement of MediaWiki extensions and skins with now-public Phabricator tasks, security patches and backports [1]:

ReportIncident
+ (T414582, CVE-2026-5762) - ReportIncident DiscussionTools integration causes slow requests with occasional timeouts on large talk pages
https://gerrit.wikimedia.org/r/q/I05d7f65c57d9aa1b70cdb159c4291ac28c60b4dd

ProofreadPage
+ (T406088, CVE-2026-39838) - ProofreadPage improperly sanitizes multiline styles using Sanitizer::checkCSS 
https://gerrit.wikimedia.org/r/q/Idd51e18479b32b7176b43ff74ca1c49d6bdd0628

Cargo
+ (T416271, CVE-2026-39839) - Stored XSS through URLs in Cargo's map format
https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Cargo/+/1237957
https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Cargo/+/1237977

Cargo
+ (T416368, CVE-2026-39840) - CSS injection in multiple Cargo display formats
https://gerrit.wikimedia.org/r/c/1237966

Cargo
+ (T416389, CVE-2026-39841) - Stored XSS through list fields on Cargo's page values and Special:CargoTables
https://gerrit.wikimedia.org/r/c/1237973

Cargo
+ (T416402, CVE-2026-39837) - Stored XSS through the dynamic table format in Cargo
https://gerrit.wikimedia.org/r/c/1237979

WikiLove
+(T416502, CVE-2026-22711) - Stored XSS through system messages in WikiLove
https://gerrit.wikimedia.org/r/q/Iab86209478a044504f5a6aea0d8c3d14f21c48b3

CentralAuth
+(T418122, CVE-2026-39937) - Global vanishing does not completely remove user email
https://gerrit.wikimedia.org/r/q/I0b72427fa329aee85841a2cb23dec3058edce85e

GlobalWatchlist
+(T418179, CVE-2026-39933) - Multiple XSS vulnerabilities in GlobalWatchlist
https://gerrit.wikimedia.org/r/q/I1fc7b7e1d234b0aaf9f7d782a65da1451577587e

GrowthExperiments
+(T418222, CVE-2026-39934) - ReassignMenteesJob runs as an infinite loop
https://gerrit.wikimedia.org/r/c/1243874

CampaignEvents
+(T418254, CVE-2026-39935) - Stored XSS through system messages
https://gerrit.wikimedia.org/r/c/1249320

Score
+(T419186, CVE-2026-39936) - Stored XSS due to usage of non-reserved data attributes
https://gerrit.wikimedia.org/r/q/I1fb2913bc32328cbc4ecd4b4ad4a4788fb98c56c

RenderBlocking 
+(GHSA-4h5r-8rjm-496r, CVE-2026-30977) - Stored XSS in renderblocking-css with Inline Assets mode
https://github.com/lihaohong6/RenderBlocking/commit/096fc47dad9dca153b02cba3db81f412c87fb2be

The Wikimedia Security Team recommends updating these extensions and/or skins to the current master branch or relevant, supported release branch [2] as soon as possible. Some of the referenced Phabricator tasks above _may_ still be private. Unfortunately, when security issues are reported, sometimes sensitive information is exposed and since Phabricator is historical, we cannot make these tasks public without exposing this sensitive information. If you have any additional questions or concerns regarding this update, please feel free to contact security@wikimedia.org or file a security task within Phabricator [3]. CVE JSON references can be found on Gitlab [4].

[1] https://phabricator.wikimedia.org/T411394
[2] https://www.mediawiki.org/wiki/Version_lifecycle
[3] https://www.mediawiki.org/wiki/Reporting_security_bugs
[4] https://gitlab.wikimedia.org/repos/security/wikimedia-cve-assignments

Notes regarding the above draft (does not necessarily mean that something is wrong, but that I thought it was worth noting/asking about):

  • [...]we would also like to provide this supplementary announcement of MediaWiki extensions and skins with now-public Phabricator tasks, security patches and backports [1]: The link at [1] is to T368628: Write and send supplementary release announcement for extensions and skins with security patches (1.39.9/1.41.3/1.42.2), which seems like a task corresponding with a previous release/announcement from 2024 (unless there's something I'm missing).
  • All of the referenced Phabricator tasks appear to now be public, except for T416502.
  • +(T418179, CVE-2026-39933) - Multiple XSS vulnerabilities: for consistency with previous entries on this list, should this be suffixed with "in GlobalWatchlist" (ie., Multiple XSS vulnerabilities in GlobalWatchlist)?
  • +(T418254, CVE-2026-39935) - XSS-via-i18n in localised wiki names: for consistency with a previous entry on this list, should this be described as "Stored XSS through system messages" or similar? (Just as otherwise this email may be using two terms for what (IIUC) is the same category of vulnerability.)

Non-exhaustive notes on the referenced CVEs:

Other notes:

  • According to the task description of T418222: CVE-2026-39934: With hidden mentees, ReassignMenteesJob runs as an infinite loop (if I'm reading/understanding it correctly), the issue described in that task may have been occurring since 2024. However, FWICS, that task's patch was only backported to wmf/ branches, and I can't see any discussion on that task regarding backporting to release-branches as well. So I guess I'm wondering whether a fix for that task should have been backported to release-branches (and I'm also wondering whether this might affect the accuracy of its current CVE).

Yeah, @Mstyles and @ASanford-WMF should be able to address these before we send out the emails.

Yes, we just need to update the Phab bug to this task.

  • All of the referenced Phabricator tasks appear to now be public, except for T416502.
  • +(T418179, CVE-2026-39933) - Multiple XSS vulnerabilities: for consistency with previous entries on this list, should this be suffixed with "in GlobalWatchlist" (ie., Multiple XSS vulnerabilities in GlobalWatchlist)?

Now public.

  • +(T418254, CVE-2026-39935) - XSS-via-i18n in localised wiki names: for consistency with a previous entry on this list, should this be described as "Stored XSS through system messages" or similar? (Just as otherwise this email may be using two terms for what (IIUC) is the same category of vulnerability.)

I updated the title a bit.

  • CVE-2026-39838 does not appear to list any affected versions of ProofreadPage -- its description just (in relevant part) says "This issue affects .", and the 'Product Status' information just appears to list 3 apparently-unaffected versions.

@ASanford-WMF will address this via an update to the CVE. That can some time to process IME.

Yes, we'll likely want to update these CVEs as well.

  • Under 'Product Status' and/or in their CVE descriptions, CVE-2026-22711, CVE-2026-5762, CVE-2026-39934 & CVE-2026-39935 appear to list the affected versions as being 1.43.7, 1.44.4 & 1.45.2 (with the default status for other versions being 'unaffected'). Ignoring that these are arguably version-numbers for MW Core rather than for any extensions themselves, these version-numbers seem at a first-glance to be e.g. off-by-one/inversed: wouldn't the statuses as-of these releases be unaffected, now that the security patches have (I assume) been merged/backported in Gerrit?

These might need the patch version reduced by one if we're implying that the issues exists in < the current patch versions for this release. Generally we assume/associate the same patch releases for core for any extensions, skins, etc. if they support MediaWiki's release branch structure.

Yes, that will need to be updated.

  • According to the task description of T418222: CVE-2026-39934: With hidden mentees, ReassignMenteesJob runs as an infinite loop (if I'm reading/understanding it correctly), the issue described in that task may have been occurring since 2024. However, FWICS, that task's patch was only backported to wmf/ branches, and I can't see any discussion on that task regarding backporting to release-branches as well. So I guess I'm wondering whether a fix for that task should have been backported to release-branches (and I'm also wondering whether this might affect the accuracy of its current CVE).

It's generally up to the maintainers of a given extension to fully support their backports. When the Security-Team does these releases, we make a best effort to get various security patches merged to master/main and supported release branches. But in cases like this, especially when it involves an extremely Wikimedia-specific extension, we often just ensure that the patch was merged to master/main and then defer to the component maintainers. If you have specific questions about why the patch didn't land on other release branches, I would advise you to direct them to the component maintainers, on that specific task.

  • According to the task description of T418222: CVE-2026-39934: With hidden mentees, ReassignMenteesJob runs as an infinite loop (if I'm reading/understanding it correctly), the issue described in that task may have been occurring since 2024. However, FWICS, that task's patch was only backported to wmf/ branches, and I can't see any discussion on that task regarding backporting to release-branches as well. So I guess I'm wondering whether a fix for that task should have been backported to release-branches (and I'm also wondering whether this might affect the accuracy of its current CVE).

It's generally up to the maintainers of a given extension to fully support their backports. When the Security-Team does these releases, we make a best effort to get various security patches merged to master/main and supported release branches. But in cases like this, especially when it involves an extremely Wikimedia-specific extension, we often just ensure that the patch was merged to master/main and then defer to the component maintainers.

Acknowledged :) But in that case, I guess that CVE-2026-39934 may want to be updated to be clearer that the issue has only been fixed in master, and not in any release-branches. (Unless there's something I'm missing or misunderstanding here.)

CVE-2026-39838 does not appear to list any affected versions of ProofreadPage -- its description just (in relevant part) says "This issue affects .", and the 'Product Status' information just appears to list 3 apparently-unaffected versions.

Fixed.

Under 'Product Status' and/or in their CVE descriptions, CVE-2026-22711, CVE-2026-5762, CVE-2026-39934 & CVE-2026-39935 appear to list the affected versions as being 1.43.7, 1.44.4 & 1.45.2 (with the default status for other versions being 'unaffected'). Ignoring that these are arguably version-numbers for MW Core rather than for any extensions themselves, these version-numbers seem at a first-glance to be e.g. off-by-one/inversed: wouldn't the statuses as-of these releases be unaffected, now that the security patches have (I assume) been merged/backported in Gerrit?

For CVE-2026-5762, it was not backported because of merge conflicts. I've clarified in the CVE description that it is only fixed on master.

For CVE-2026-5762, the Phabricator link included under 'References' is to this tracking-task

Fixed. Good catch!

Mstyles changed the visibility from "Custom Policy" to "Public (No Login Required)".Wed, Apr 8, 10:11 PM
Mstyles changed the edit policy from "Subscribers" to "All Users".

Email from T411394#11796980 has been sent to various mailing lists:

Having an issue with the mediawiki-announce email list, but as soon as I get that fixed, I will send it out there as well

Having an issue with the mediawiki-announce email list, but as soon as I get that fixed, I will send it out there as well

Yeah, something strange must have happened. I don't see the supp release email in any of mediawiki-announce's archives or held queue. Let me try to send it and see what happens.

Ok, that seems to have worked. My email made it into the held queue and I approved it (as an admin of mediawiki-announce-l). Here it is in the archives:

https://lists.wikimedia.org/hyperkitty/list/mediawiki-announce@lists.wikimedia.org/thread/VXEYKT6FNA5NYFPAYU67SNTNBXLTQ4FN/

sbassett claimed this task.
sbassett moved this task from In Progress to Done on the user-sbassett board.
sbassett moved this task from Incoming to Our Part Is Done on the Security-Team board.
sbassett updated Other Assignee, added: ASanford-WMF.
sbassett updated the task description. (Show Details)