CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

Self-propagating JavaScript worm targets Wikimedia projects

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

A self-propagating JavaScript worm exploited a malicious script on Russian Wikipedia, spreading across multiple Wikimedia projects and vandalizing pages. The worm modified user scripts and global JavaScript files, affecting approximately 3,996 pages and 85 user accounts. Wikimedia temporarily restricted editing to contain the attack and revert changes. The incident began when a Wikimedia employee account executed a dormant script, which then propagated through user sessions and global scripts. The worm's persistence mechanisms included modifying user-level and site-wide JavaScript files, allowing it to spread automatically. The injected code also edited random pages to insert hidden JavaScript loaders. Wikimedia has not yet released a detailed post-incident report.

Timeline

  1. 05.03.2026 22:42 1 articles · 2h ago

    Self-propagating JavaScript worm affects Wikimedia projects

    A self-propagating JavaScript worm began vandalizing pages and modifying user scripts across multiple Wikimedia projects. The incident started when a malicious script hosted on Russian Wikipedia was executed by a Wikimedia employee account. The worm spread by injecting malicious JavaScript loaders into user common.js and global MediaWiki:Common.js files, affecting approximately 3,996 pages and 85 user accounts. Wikimedia temporarily restricted editing to contain the attack and revert changes.

    Show sources

Information Snippets