Wikipedia Hit by Self-Propagating JavaScript Worm
A dormant JavaScript worm activated during a security review vandalized 4,000 Wikipedia pages in 23 minutes. Here's what happened and why it matters.
The Wikimedia Foundation disclosed a security incident on March 5 after a self-propagating JavaScript worm began vandalizing pages and modifying user scripts across its wikis. The worm modified approximately 3,996 pages and compromised 85 user accounts before engineers contained the outbreak—all within 23 minutes.
What Happened
Wikimedia staff were conducting a routine security review of user-authored code when they inadvertently triggered dormant malicious code. The script, stored at User:Ololoshka562/test.js, had been uploaded in March 2024 and sat dormant for two years before activation.
Once executed, the worm self-propagated by injecting malicious JavaScript loaders into both individual users' common.js files and Wikipedia's global MediaWiki:Common.js—which loads for every visitor. This dual-injection technique gave the worm both user-level and site-wide persistence.
The attack chain worked like this: when an administrator or privileged user loaded a compromised page, the script executed in their browser context and used their elevated permissions to spread to additional pages. Because MediaWiki:Common.js is a protected system file, the attacker needed admin-level access to modify it—which they obtained by hijacking administrator sessions.
Technical Details
According to Wikimedia's incident report, the malicious script was allegedly associated with previous attacks on wiki projects. The code had been designed to:
- Inject loaders into
User:/common.jsfor user-level persistence - Modify
MediaWiki:Common.jsfor site-wide execution - Vandalize article content on Meta-Wiki
- Propagate to any privileged user who loaded a compromised page
The script exploited a fundamental trust model in MediaWiki: user scripts execute with the full permissions of the logged-in user. For administrators, this means write access to protected system files.
Why This Matters
Wikipedia's open editing model has always balanced accessibility against security. This incident highlights how that balance can be exploited—even by code that sat dormant for years waiting to be triggered.
The attack mirrors supply chain compromises we've seen in other ecosystems. Similar to how threat actors have planted malicious packages in npm registries to wait for installation, this attacker uploaded malicious code and simply waited. The two-year dormancy period made detection nearly impossible through conventional means.
For organizations running MediaWiki instances—including corporate wikis and internal knowledge bases—this incident underscores the need to audit user-uploaded scripts. The Wikimedia Foundation has confirmed they're implementing additional code review processes for user scripts.
No Data Breach Confirmed
Wikimedia emphasized that no personal information was exposed. The worm's behavior was purely destructive—vandalizing pages and modifying scripts—rather than data exfiltration. All affected pages have been restored from backups.
"The code was active for a 23 minute period," the Foundation stated. "During that time, it changed and deleted content on Meta-Wiki—which is now being restored—but it did not cause permanent damage. There is no evidence that Wikipedia was under attack, or that personal information was breached."
Detection and Response
Engineers detected the anomalous activity through automated monitoring that flagged unusual edit patterns. They temporarily restricted editing across all projects while investigating, then began systematically reverting malicious changes.
The rapid response demonstrates why monitoring for suspicious behavior matters more than perimeter defenses alone. The worm was already executing inside trusted infrastructure—only behavioral detection caught it.
Organizations running wiki platforms should review their security configurations. Key mitigations include:
- Audit existing user scripts for dormant malicious code
- Implement Content Security Policy to restrict script execution
- Enable edit monitoring to detect mass automated changes
- Restrict system file modifications to verified accounts with MFA
- Maintain offline backups separate from production systems
The incident serves as a reminder that open platforms require ongoing vigilance. Dormant threats can activate without warning, and two-year-old code can become today's security incident.
Related Articles
TeamPCP Worm Turns Cloud Misconfigs Into Cybercrime Platform
Cloud-native worm campaign by TeamPCP has compromised 60,000+ servers by exploiting Docker APIs, Kubernetes, and React2Shell. Flare researchers detail the industrialized operation.
Feb 18, 2026Astaroth Banking Trojan Spreads via WhatsApp Worm in Brazil
New Boto Cor-de-Rosa campaign uses Python-based worm module to auto-send malware through victims' WhatsApp contacts.
Jan 17, 2026Malicious npm Package 'lotusbail' Hijacked WhatsApp Accounts for Six Months
Supply chain attack disguised as working WhatsApp API library stole credentials, messages, and linked attacker devices to victim accounts. 56,000+ downloads since May.
Dec 28, 2025Attackers Use Bing AI Search to Distribute GhostSocks Malware
Malicious GitHub repositories exploiting Bing AI search results to distribute infostealers and GhostSocks proxy malware. Fake OpenClaw installers turn victims into residential proxies.
Mar 5, 2026