Description
In MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4, XSS related to jQuery can occur. The attacker creates a message with [javascript:payload xss] and turns it into a jQuery object with mw.message().parse(). The expected result is that the jQuery object does not contain an <a> tag (or it does not have a href attribute, or it's empty, etc.). The actual result is that the object contains an <a href ="javascript... that executes when clicked.
Remediation
References
Related Vulnerabilities
WordPress Plugin 404page-your smart custom 404 error page Cross-Site Request Forgery (10.3)
WordPress Plugin Kish Guest Posting 'uploadify.php' Arbitrary File Upload (1.2)
WordPress Plugin Age Gate Open Redirect (2.13.4)
Varnish Cache Permissions, Privileges, and Access Controls Vulnerability (CVE-2013-0345)