XSS exists in the MobileFrontend extension for MediaWiki before 1.34.4 because section.line is mishandled during regex section line replacement from PageGateway. Using crafted HTML, an attacker can elicit an XSS attack via jQuery's parseHTML method, which can cause image callbacks to fire even without the element being appended to the DOM. References: https://gerrit.wikimedia.org/r/q/I42e079bc875d17b336ab015f3678eaedc26e10ea https://phabricator.wikimedia.org/T262213
Created mediawiki tracking bugs for this issue: Affects: fedora-all [bug 1903753]
Upstream commit: https://gerrit.wikimedia.org/r/c/mediawiki/extensions/MobileFrontend/+/626695
External References: https://phabricator.wikimedia.org/T262213
The vulnerability is directly related to MobileFrontent Extension, which is not bundled in the OpenShift mediawiki package.
Statement: OpenShift Container Platform (OCP) delivers the mediawiki package, but the vulnerable code is not bundled, therefore OCP is not affected by this flaw.
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-26120