Wikipedia Hit by Self-Propagating JavaScript Worm
A dormant JavaScript worm activated during a Wikimedia security review modified 4,000 pages and infected 85 user scripts in 23 minutes before containment.
The Wikimedia Foundation suffered an unusual security incident on March 5, 2026, when a self-propagating JavaScript worm began vandalizing pages and hijacking user scripts across Meta-Wiki. The attack lasted just 23 minutes but modified approximately 3,996 pages and compromised the common.js files of 85 users.
How the Worm Activated
The malicious code had been dormant since March 2024, sitting innocuously at User:Ololoshka562/test.js. Wikimedia Foundation staff accidentally triggered it during a routine security review of user-authored code. An employee account testing user-script functionality executed the payload, and the worm immediately began spreading.
The script's propagation mechanism was clever: it injected malicious JavaScript loaders into both a logged-in user's personal common.js file and Wikipedia's global MediaWiki:Common.js, which runs for every visitor. This dual-injection approach meant the worm could spread through both authenticated sessions and site-wide execution.
Rapid Containment
Wikimedia engineers responded within minutes, temporarily restricting editing privileges across all projects while they investigated the scope. The 23-minute window limited the damage, and the foundation confirmed that no permanent data loss occurred and no personal information was exposed.
"The code was active for a 23 minute period," Wikimedia stated in its incident report. "During that time, it changed and deleted content on Meta-Wiki – which is now being restored – but it did not cause permanent damage."
All modified pages have since been reverted to their pre-incident state. The foundation emphasized that this was not an external attack—the malicious code was already present in the system, waiting to be executed.
A Two-Year-Old Threat
Security researchers noted that the script at User:Ololoshka562/test.js was allegedly associated with similar attacks on wiki projects in prior years. The fact that this code sat undetected for two years raises questions about how thoroughly user-contributed scripts are audited, particularly on platforms that allow arbitrary JavaScript execution.
Wikipedia's open editing model extends to user scripts, which power countless productivity enhancements and customizations. But this same flexibility creates risk. Unlike supply chain attacks targeting package managers, wiki-based script injection doesn't require compromising an upstream dependency—the attack surface is the platform itself.
Why This Matters
The incident highlights an often-overlooked attack vector: user-contributed code on platforms with permissive scripting capabilities. Wikipedia isn't alone in this exposure. Any platform allowing custom JavaScript—browser extensions, SaaS tools with plugin ecosystems, or wikis with user scripts—faces similar risks.
For organizations running internal wikis or documentation platforms with scripting support, this serves as a reminder to audit user-contributed code regularly. Organizations unfamiliar with self-propagating malware should review our malware fundamentals guide for context on worm behavior and containment strategies.
The Wikimedia Foundation has not announced specific policy changes following the incident, but the security review that inadvertently triggered the worm suggests increased scrutiny of legacy user scripts is already underway.
Related Articles
Wikipedia Hit by Self-Propagating JavaScript Worm
A dormant JavaScript worm activated during a security review vandalized 4,000 Wikipedia pages in 23 minutes. Here's what happened and why it matters.
Mar 7, 2026AppsFlyer SDK Hijacked to Steal Crypto via Supply Chain Attack
Attackers compromised AppsFlyer's domain registrar to inject crypto-stealing JavaScript into their Web SDK. The malware swaps wallet addresses for Bitcoin, Ethereum, Solana, and more.
Mar 14, 2026TeamPCP Worm Turns Cloud Misconfigs Into Cybercrime Platform
Cloud-native worm campaign by TeamPCP has compromised 60,000+ servers by exploiting Docker APIs, Kubernetes, and React2Shell. Flare researchers detail the industrialized operation.
Feb 18, 2026Astaroth Banking Trojan Spreads via WhatsApp Worm in Brazil
New Boto Cor-de-Rosa campaign uses Python-based worm module to auto-send malware through victims' WhatsApp contacts.
Jan 17, 2026