Loading HuntDB...

GHSA-62r2-gcxr-426x

GitHub Security Advisory

starcitizentools/citizen-skin vulnerable to stored, self-XSS in the "real name" field

✓ GitHub Reviewed MODERATE Has CVE

Advisory Details

### Summary
A user with the `editmyprivateinfo` right or who can otherwise change their name can XSS themselves by setting their "real name" to an XSS payload.

### Details
Here's the offending line:
https://github.com/StarCitizenTools/mediawiki-skins-Citizen/blob/d45c3d69f30863f622f16eb40dd41d3ca943454a/includes/Components/CitizenComponentUserInfo.php#L137

This was introduced in 717d16af35b10dab04d434aefddbf991fc8c168c

### PoC
1. Login
2. Go to Special:Preferences
3. Set the real name field to a string like `<script>alert("Admin with a propensity for self-XSSes")</script>`
4. Save your settings and use Citizen if it's not being used already

![](https://github.com/user-attachments/assets/22adbb70-fcd7-4f81-8e53-1f5f3a730270)

### Impact
Any user who can change their name (whether it's through the editmyprivateinfo right or through other means) can add XSS payloads that trigger for themselves only.

Affected Packages

Packagist starcitizentools/citizen-skin
Affected versions: 2.6.3 (fixed in 2.31.0)

Related CVEs

Key Information

GHSA ID
GHSA-62r2-gcxr-426x
Published
September 30, 2024 5:48 PM
Last Modified
September 30, 2024 8:11 PM
CVSS Score
5.0 /10
Primary Ecosystem
Packagist
Primary Package
starcitizentools/citizen-skin
GitHub Reviewed
✓ Yes

Dataset

Last updated: June 18, 2025 6:25 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.