CVE-2025-21612:
Extension:TabberNeue vulnerable to Cross-site Scripting
8.6
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.3118%
CWE
Published
1/6/2025
Updated
1/6/2025
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
starcitizentools/tabber-neue | composer | >= 1.9.1, < 2.7.2 | 2.7.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The primary vulnerability stems from the buildTabTransclude
function in TabberNeueHooks.php
. In the original code (introduced in d8c3db4), $pageName
(user-controlled input) was directly interpolated into an HTML error message via sprintf()
without escaping. This was patched in f229cab by adding Sanitizer::escapeHtmlAllowEntities()
. The PoC demonstrates this vector by injecting a <script>
tag via the page name parameter. The other two reported issues were deemed invalid/unreachable: (1) recursiveTagParse
usage in Tabber.php
is mitigated by MediaWiki
's parser sanitization, and (2) TabberParsoid.php
's code was unused. The confidence is high due to the reproducible PoC and explicit patch addressing this specific code path.