Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 12 Feb 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wikiworks
Wikiworks approved Revs |
|
| CPEs | cpe:2.3:a:wikiworks:approved_revs:1.39:*:*:*:*:mediawiki:*:* cpe:2.3:a:wikiworks:approved_revs:1.43:*:*:*:*:mediawiki:*:* cpe:2.3:a:wikiworks:approved_revs:1.44:*:*:*:*:mediawiki:*:* cpe:2.3:a:wikiworks:approved_revs:1.45:*:*:*:*:mediawiki:*:* |
|
| Vendors & Products |
Wikiworks
Wikiworks approved Revs |
|
| Metrics |
cvssV3_1
|
Fri, 09 Jan 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 09 Jan 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mediawiki
Mediawiki mediawiki Wikimedia Wikimedia mediawiki-approvedrevs Extension |
|
| Vendors & Products |
Mediawiki
Mediawiki mediawiki Wikimedia Wikimedia mediawiki-approvedrevs Extension |
Fri, 09 Jan 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper Encoding or Escaping of Output due to magic word replacement in ParserAfterTidy vulnerability in The Wikimedia Foundation Mediawiki - ApprovedRevs Extension allows Input Data Manipulation.This issue affects Mediawiki - ApprovedRevs Extension: 1.45, 1.44, 1.43, 1.39. | |
| Title | ApprovedRevs allows bypassing the inline CSS sanitizer | |
| Weaknesses | CWE-116 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: wikimedia-foundation
Published:
Updated: 2026-01-09T19:15:28.083Z
Reserved: 2026-01-08T23:23:42.385Z
Link: CVE-2026-22712
Updated: 2026-01-09T19:15:25.619Z
Status : Analyzed
Published: 2026-01-09T00:15:45.837
Modified: 2026-02-12T17:50:28.073
Link: CVE-2026-22712
No data.
OpenCVE Enrichment
Updated: 2026-01-09T13:24:05Z