-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| mediawiki/core | composer | >= 1.18.0, < 1.27.6 | 1.27.6 |
| mediawiki/core | composer | >= 1.30.0, < 1.30.2 | 1.30.2 |
| mediawiki/core | composer | >= 1.31.0, < 1.31.2 | 1.31.2 |
| mediawiki/core | composer | >= 1.32.0, < 1.32.2 | 1.32.2 |
The vulnerability stems from missing CIDR validation in the API block handler. The Phabricator task T199540 specifically shows the security patch was applied to ApiBlock.php to add $wgBlockCIDRLimit checks. Since the vulnerability description explicitly mentions API-based bypass and the fix targets the API block implementation, ApiBlock::execute is the primary vulnerable entry point that lacked proper access control checks for CIDR range size limits prior to patching.
Ongoing coverage of React2Shell