Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 24 Feb 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wikisphere
Wikisphere visualdata |
|
| CPEs | cpe:2.3:a:mediawiki:mediawiki:1.45.0:*:*:*:*:*:*:* cpe:2.3:a:wikisphere:visualdata:-:*:*:*:*:mediawiki:*:* |
|
| Vendors & Products |
Wikisphere
Wikisphere visualdata |
Thu, 08 Jan 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mediawiki
Mediawiki mediawiki Wikimedia Wikimedia mediawiki-visualdata Extension |
|
| Vendors & Products |
Mediawiki
Mediawiki mediawiki Wikimedia Wikimedia mediawiki-visualdata Extension |
Thu, 08 Jan 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Wed, 07 Jan 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Wed, 07 Jan 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Inefficient Regular Expression Complexity vulnerability in Wikimedia Foundation MediaWiki - VisualData Extension allows Regular Expression Exponential Blowup.This issue affects MediaWiki - VisualData Extension: 1.45. | |
| Title | VisualData extension: Regular Expression Denial of Service (ReDoS) via crafted user input | |
| Weaknesses | CWE-1333 | |
| References |
|
|
Status: PUBLISHED
Assigner: wikimedia-foundation
Published:
Updated: 2026-01-07T19:17:41.764Z
Reserved: 2026-01-07T16:34:59.342Z
Link: CVE-2026-0668
Updated: 2026-01-07T19:17:16.412Z
Status : Analyzed
Published: 2026-01-07T18:15:52.873
Modified: 2026-02-24T18:32:21.493
Link: CVE-2026-0668
OpenCVE Enrichment
Updated: 2026-01-08T09:48:00Z