Coding4Food LogoCoding4Food
HomeCategoriesArcadeBookmarks
vi
HomeCategoriesArcadeBookmarks
Coding4Food LogoCoding4Food
HomeCategoriesArcadeBookmarks
Privacy|Terms

© 2026 Coding4Food. Written by devs, for devs.

All news
IT DramaTechnology

Wikipedia Goes Read-Only: The Old-School XSS Worm That Nuked Admin Accounts

March 6, 20263 min read

Wikipedia was forced into read-only mode after a classic XSS worm compromised admin accounts. Let's unpack this dumpster fire of jQuery and PHP memes.

Share this post:
scam, alert, cybersecurity, phishing, fraud, hacker, crime, attack, warning, cut out, scam, scam, scam, scam, scam
Nguồn gốc: https://coding4food.com/post/wikipedia-read-only-mass-admin-xss-worm. Nội dung thuộc bản quyền Coding4Food. Original source: https://coding4food.com/post/wikipedia-read-only-mass-admin-xss-worm. Content is property of Coding4Food. This content was scraped without permission from https://coding4food.com/post/wikipedia-read-only-mass-admin-xss-wormNguồn gốc: https://coding4food.com/post/wikipedia-read-only-mass-admin-xss-worm. Nội dung thuộc bản quyền Coding4Food. Original source: https://coding4food.com/post/wikipedia-read-only-mass-admin-xss-worm. Content is property of Coding4Food. This content was scraped without permission from https://coding4food.com/post/wikipedia-read-only-mass-admin-xss-worm
Nguồn gốc: https://coding4food.com/post/wikipedia-read-only-mass-admin-xss-worm. Nội dung thuộc bản quyền Coding4Food. Original source: https://coding4food.com/post/wikipedia-read-only-mass-admin-xss-worm. Content is property of Coding4Food. This content was scraped without permission from https://coding4food.com/post/wikipedia-read-only-mass-admin-xss-wormNguồn gốc: https://coding4food.com/post/wikipedia-read-only-mass-admin-xss-worm. Nội dung thuộc bản quyền Coding4Food. Original source: https://coding4food.com/post/wikipedia-read-only-mass-admin-xss-worm. Content is property of Coding4Food. This content was scraped without permission from https://coding4food.com/post/wikipedia-read-only-mass-admin-xss-worm
xss wormwikipedia sậpbảo mậtmediawikibug xssdrama ithack tài khoảnjquery
Share this post:

Bình luận

Related posts

log in, login, log on, symbol, gui, button, computer, icon, black computer, black laptop, log in, login, login, login, login, login
IT DramaDev Life

The Ultimate CYA: User Blames IT for 'Broken' Tools to Hide His 2-Hour Workdays

A hilarious Reddit saga where a remote worker blamed the IT support team for his lack of productivity, only for system logs to reveal he barely works at all.

Apr 173 min read
Read more →
job interview, career, conference, conversation, discussion, employer, employment, interview, interviewee, interviewer, interviewing, job, meeting, people, resume, application for employment, job application, job interview, interview, interview, interview, interview, interview, resume, resume
IT DramaDev Life

I Just Want to Wash Dishes! When HR Tests Look Like Area 51 Entrance Exams

r/recruitinghell drama: An applicant just wants to wash dishes but faces a creepy facial recognition test. Reddit exposes the ultimate cheat code to pass HR BS.

Apr 203 min read
Read more →
hacker, full hd wallpaper, hood, wallpaper hd, beautiful wallpaper, windows wallpaper, free background, light, boy, criminal, portal, hd wallpaper, mac wallpaper, fantastic, youth, wallpaper 4k, life style, wallpaper, star, laptop wallpaper, cool backgrounds, free wallpaper, desktop backgrounds, 4k wallpaper 1920x1080, 4k wallpaper, background
IT DramaTechnology

The GitHub Black Market: When Open-Source Stars Are Just Bought and Paid For

Deep dive into the underground market of faking GitHub stars. How bots and click farms manipulate trending repos to fool devs and VC funds.

Apr 203 min read
Read more →
programming, robot, cyborg, artificial intelligence, programmer, technology, futuristic, computer, data, internet, information, communication, tech, network, laptop, server, cartoon
TechnologyAI & Automation

Cloudflare's New Tool Wants You to Code for AI Agents. Are Humans Obsolete?

Cloudflare launched 'Agent-Ready Scanner' to audit if your website can handle AI agents. Are we building the web for machines now? Let's dive into the drama.

Apr 192 min read
Read more →
ai generated, data centre, computer, server, rack, technology, digital, processor, data centre, data centre, data centre, data centre, data centre
IT DramaTechnology

Vercel Got Breached: The Time-Traveling 'April 2026' Security Incident

Next.js powerhouse Vercel just confirmed a security breach while hackers try to sell their data. Let's break down this bizarre 'future' incident and the fallout.

Apr 203 min read
Read more →
The Gavel Drops: Live Nation Busted for Monopoly as Ticketing Tech Remains a Dumpster Fire
IT DramaTechnology

The Gavel Drops: Live Nation Busted for Monopoly as Ticketing Tech Remains a Dumpster Fire

A jury just slammed Live Nation for illegally monopolizing the ticketing market. For devs, this is what happens when zero competition meets massive tech debt.

Apr 163 min read
Read more →

Just when you thought XSS worms were a relic of the MySpace era, Wikipedia gets body-slammed by a piece of JavaScript hiding behind jQuery. Imagine trying to look up some obscure software engineering concept, only to be greeted by a glaring red "Read-only mode" banner.

Yep, Wikimedia Foundation had to lock down the entire internet's encyclopedia because a bunch of admin accounts got massively compromised. Let's unpack this glorious dumpster fire.

What in the MySpace Samy is going on here?

For those who missed the chaotic status updates, Wikipedia basically had to revoke write access for everyone. The culprit? An old-school Cross-Site Scripting (XSS) worm.

The payload somehow managed to inject itself into the global MediaWiki:Common.js page (and User:Common.js as a fallback). Once a user loaded the infected script, it executed a wild sequence of events:

  • Stealth mode via jQuery: It literally uses jQuery to hide UI elements so the victim doesn't realize their account is acting up. (Shoutout to jQuery in 2024!).
  • Vandalism: It defaces about 20 random articles by injecting a massive 5000px-wide image.
  • The Nuke: If the infected user happens to be an Admin, the script triggers Special:Nuke to silently delete 3 random articles from the global namespace, plus another 20 using the action=delete endpoint.
  • The Signature: It leaves behind the Russian phrase "Закрываем проект" (Closing the project).

Hacker News & Reddit having a field day

The dev community's reaction has been a mix of pure nostalgia and cynical tech-bashing.

1. The "Script Kiddie" Theory Security sleuths quickly noticed the worm tried to load an additional XSS script from basemetrika.ru. The hilarious part? That domain doesn't even exist (NXDomain response). This sparked debates on whether it's a script kiddie who messed up their payload, or if the worm was hallucinated by an AI that just made up a fake URL.

2. The Missed Opportunity As one pragmatic dev pointed out: If you have a self-replicating XSS worm running in the browsers of Wikipedia admins, why just vandalize articles? They could have easily harvested credentials via browser autofill. A massive credential leak would be infinitely worse. Instead, the attacker chose chaos and 5000px images.

3. The Obligatory PHP Bashing It wouldn't be a MediaWiki drama without someone dragging PHP through the mud. One commenter summed it up perfectly: "Here before someone says that it's because MediaWiki is written in PHP - the language where 'return flase' causes it to return true."

4. Peak Wikipedia Humor Even locked-out editors couldn't resist a joke: "How do we know Wikipedia is down? Has this been published in a Reliable Source?"

The Takeaway: Trust No One

Jokes aside, there's a serious lesson here. MediaWiki has historically allowed high-level users to embed custom JS for UI tweaks. From a security standpoint, that's like handing out loaded shotguns at a party.

As developers, let this be your daily reminder: Never trust user input. It doesn't matter if they are a regular user, an Admin, or the CEO. Sanitize your inputs, implement strict Content Security Policies (CSP), and for the love of god, don't execute raw user-provided strings. Otherwise, you might be the one writing an incident report at 3 AM.


Sources:

  • Wikimedia Status: https://www.wikimediastatus.net
  • Hacker News Thread / Wikipediocracy / Reddit.