This issue affects Vector: from >= 1.40.0 before 1.42.7, 1.43.2, 1.44.0.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://phabricator.wikimedia.org/T396685 |
|
Wed, 04 Feb 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wikimedia
Wikimedia vector |
|
| Vendors & Products |
Wikimedia
Wikimedia vector |
Tue, 03 Feb 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 02 Feb 2026 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Wikimedia Foundation Vector. This vulnerability is associated with program files resources/skins.Vector.Js/portlets.Js, resources/skins.Vector.Legacy.Js/portlets.Js. This issue affects Vector: from >= 1.40.0 before 1.42.7, 1.43.2, 1.44.0. | |
| Title | Vector inserts portlet labels as HTML, allowing for stored XSS through system messages | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: wikimedia-foundation
Published:
Updated: 2026-02-03T21:12:11.934Z
Reserved: 2025-06-24T22:28:16.378Z
Link: CVE-2025-6596
Updated: 2026-02-03T21:11:51.960Z
Status : Deferred
Published: 2026-02-02T23:16:02.310
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-6596
No data.
OpenCVE Enrichment
Updated: 2026-02-04T12:17:59Z