Description
Vulnerability in Wikimedia Foundation AbuseFilter.

This issue affects AbuseFilter: from * before 1.43.7, 1.44.4, 1.45.2.
Published: 2026-05-11
Score: 2.1 Low
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

AbuseFilter exposes information that is intended to be access‑controlled, due to a misuse of the ::userCanBitfield function. The flaw allows users to obtain data about which actions or permissions are held by other users, violating confidentiality and potentially aiding adversaries in planning further attacks. The primary impact is the disclosure of privileged information, without any direct code execution or denial of service.

Affected Systems

Wikimedia Foundation AbuseFilter is affected. The vulnerability exists in versions prior to 1.43.7, 1.44.4, and 1.45.2. Any installation running these versions can potentially leak access‑controlled information.

Risk and Exploitability

The CVSS score of 2.1 indicates a low overall risk. The EPSS score is unavailable, and the vulnerability is not currently listed in the CISA KEV catalog. Attack vectors are inferred from the description to be via normal use of the AbuseFilter API, which is generally accessible to authenticated users. An attacker could request filter data and receive additional user permission details. Although exploitation is unlikely to result in further privileges, the leaked information may be valuable for reconnaissance.

Generated by OpenCVE AI on May 11, 2026 at 22:46 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade AbuseFilter to version 1.43.7 or later (including 1.44.4+ and 1.45.2+).
  • If an upgrade is not immediately possible, restrict access to AbuseFilter API endpoints to trusted administrators only.
  • Monitor API activity for anomalous requests that may indicate attempts to harvest permission data.

Generated by OpenCVE AI on May 11, 2026 at 22:46 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6208-1 mediawiki security update
References
History

Mon, 11 May 2026 20:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-200
CWE-284

Mon, 11 May 2026 18:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-20
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 11 May 2026 17:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-200
CWE-284

Mon, 11 May 2026 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Wikimedia
Wikimedia abusefilter
Vendors & Products Wikimedia
Wikimedia abusefilter

Mon, 11 May 2026 15:30:00 +0000

Type Values Removed Values Added
Description Vulnerability in Wikimedia Foundation AbuseFilter. This issue affects AbuseFilter: from * before 1.43.7, 1.44.4, 1.45.2.
Title AbuseFilter misuses ::userCanBitfield, exposing access-controlled information
References
Metrics cvssV4_0

{'score': 2.1, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/S:N/AU:Y'}


Subscriptions

Wikimedia Abusefilter
cve-icon MITRE

Status: PUBLISHED

Assigner: wikimedia-foundation

Published:

Updated: 2026-05-11T17:33:27.011Z

Reserved: 2026-03-25T17:15:46.521Z

Link: CVE-2026-34086

cve-icon Vulnrichment

Updated: 2026-05-11T17:33:19.650Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-11T16:17:29.857

Modified: 2026-05-12T14:45:49.820

Link: CVE-2026-34086

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-11T23:00:19Z

Weaknesses