Loading HuntDB...

GHSA-jwr7-992g-68mh

GitHub Security Advisory

starcitizentools/citizen-skin allows stored XSS in preference menu heading messages

✓ GitHub Reviewed MODERATE Has CVE

Advisory Details

### Summary
Various preferences messages are inserted into raw HTML, allowing anybody who can edit those messages to insert arbitrary HTML into the DOM.

### Details
The `innerHtml` of the label div is set to the `textContent` of the label, essentially unsanitizing the system messages:
https://github.com/StarCitizenTools/mediawiki-skins-Citizen/blob/407052e7069bdeae927d6f1a2a1c9a45b473bf9a/resources/skins.citizen.preferences/addPortlet.polyfill.js#L18

### PoC
1. Edit `citizen-feature-custom-font-size-name` (or any other message displayed in a heading in the preferences menu) to `<img src="" onerror="alert('citizen-feature-custom-font-size-name')">` (script tags don't work here due to the way the HTML is inserted)
2. Open the preferences menu
![image](https://github.com/user-attachments/assets/b75f100d-09cc-443c-b635-e9d6ab48d133)

Affected Packages

Packagist starcitizentools/citizen-skin
Affected versions: 2.13.0 (fixed in 3.3.1)

Related CVEs

Key Information

GHSA ID
GHSA-jwr7-992g-68mh
Published
June 13, 2025 2:08 PM
Last Modified
June 13, 2025 2:08 PM
CVSS Score
5.0 /10
Primary Ecosystem
Packagist
Primary Package
starcitizentools/citizen-skin
GitHub Reviewed
✓ Yes

Dataset

Last updated: June 18, 2025 6:25 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.