Unrated severityNVD Advisory· Published Sep 1, 2015· Updated May 6, 2026
CVE-2015-6728
CVE-2015-6728
Description
The ApiBase::getWatchlistUser function in MediaWiki before 1.23.10, 1.24.x before 1.24.3, and 1.25.x before 1.25.2 does not perform token comparison in constant time, which allows remote attackers to guess the watchlist token and bypass CSRF protection via a timing attack.
Affected products
6cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*+ 5 more
- cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*range: <=1.23.9
- cpe:2.3:a:mediawiki:mediawiki:1.24.0:*:*:*:*:*:*:*
- cpe:2.3:a:mediawiki:mediawiki:1.24.1:*:*:*:*:*:*:*
- cpe:2.3:a:mediawiki:mediawiki:1.24.2:*:*:*:*:*:*:*
- cpe:2.3:a:mediawiki:mediawiki:1.25.0:*:*:*:*:*:*:*
- cpe:2.3:a:mediawiki:mediawiki:1.25.1:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- lists.wikimedia.org/pipermail/mediawiki-announce/2015-August/000179.htmlnvdVendor Advisory
- lists.fedoraproject.org/pipermail/package-announce/2015-August/165193.htmlnvd
- www.openwall.com/lists/oss-security/2015/08/12/6nvd
- www.openwall.com/lists/oss-security/2015/08/27/6nvd
- www.securityfocus.com/bid/76334nvd
- security.gentoo.org/glsa/201510-05nvd
News mentions
0No linked articles in our index yet.