Greetings,

With the security/maintenance release of MediaWiki 1.35.10/1.38.6/1.39.3, we would also like to provide this supplementary announcement of MediaWiki extensions and skins with now-public Phabricator tasks, security patches and backports [1]:

CheckUser
+ (T326293, CVE-2023-29139) - API request timeout - CheckUserLog.
https://gerrit.wikimedia.org/r/c/mediawiki/extensions/CheckUser/+/877267/

GrowthExperiments
+ (T327613, CVE-2023-29140) - GrowthExperiments new impact module shows revdeleted edits.
https://gerrit.wikimedia.org/r/c/mediawiki/extensions/GrowthExperiments/+/885042/

CheckUser
+ (T278365, CVE-2023-29138) - Using checkuser api module with bad user name can still break Special:CheckUserLog even after security fixes.
https://gerrit.wikimedia.org/r/c/mediawiki/extensions/CheckUser/+/905649

PdfBook
+ (T326907, CVE-2023-24612) - Command injection in the PdfBook extension.
https://gitlab.com/organicdesign/PdfBook/-/merge_requests/6

GrowthExperiments
+ (T328643, CVE-2023-29137) - GrowthExperiments: UserImpactHandler returns timezone preference data for arbitrary users.
https://gerrit.wikimedia.org/r/c/mediawiki/extensions/GrowthExperiments/+/889295/
https://gerrit.wikimedia.org/r/c/mediawiki/extensions/GrowthExperiments/+/889296/

Widgets
+ (T330406, CVE-2023-28447) - Make a security release of Extension:Widgets due to Smarty RCE vulns.
https://gerrit.wikimedia.org/r/891977
https://gerrit.wikimedia.org/r/892451

Cargo
+ (T331321, CVE-2023-29133) - XSS in Searchtext formatter in Cargo.
https://gerrit.wikimedia.org/r/895193

Cargo
+ (T331362, CVE-2023-29134) - SQL injection in Cargo handling of quotes inside backticks.
https://gerrit.wikimedia.org/r/895774

CheckUser
+ (T331192, CVE-2023-29135) - CheckUser 'get users' form vulnerable to HTML injection through usernames.
https://gerrit.wikimedia.org/r/c/mediawiki/extensions/CheckUser/+/904920/

The Wikimedia Security Team recommends updating these extensions and/or skins to the current master branch or relevant, supported release branch [2] as soon as possible. Some of the referenced Phabricator tasks above _may_ still be private. Unfortunately, when security issues are reported, sometimes sensitive information is exposed and since Phabricator is historical, we cannot make these tasks public without exposing this sensitive information. If you have any additional questions or concerns regarding this update, please feel free to contact security@wikimedia.org or file a security task within Phabricator [3].

[1] https://phabricator.wikimedia.org/T325849
[2] https://www.mediawiki.org/wiki/Version_lifecycle
[3] https://www.mediawiki.org/wiki/Reporting_security_bugs