High severity8.8NVD Advisory· Published Mar 23, 2017· Updated May 13, 2026
CVE-2015-8623
CVE-2015-8623
Description
The User::matchEditToken function in includes/User.php in MediaWiki before 1.23.12 and 1.24.x before 1.24.5 does not perform token comparison in constant time before returning, which allows remote attackers to guess the edit token and bypass CSRF protection via a timing attack, a different vulnerability than CVE-2015-8624.
Affected products
6cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*+ 5 more
- cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*range: <=1.23.11
- cpe:2.3:a:mediawiki:mediawiki:1.24.0:*:*:*:*:*:*:*
- cpe:2.3:a:mediawiki:mediawiki:1.24.1:*:*:*:*:*:*:*
- cpe:2.3:a:mediawiki:mediawiki:1.24.2:*:*:*:*:*:*:*
- cpe:2.3:a:mediawiki:mediawiki:1.24.3:*:*:*:*:*:*:*
- cpe:2.3:a:mediawiki:mediawiki:1.24.4:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- www.openwall.com/lists/oss-security/2015/12/21/8nvdMailing ListPatchThird Party Advisory
- www.openwall.com/lists/oss-security/2015/12/23/7nvdMailing ListPatchThird Party Advisory
- lists.wikimedia.org/pipermail/mediawiki-announce/2015-December/000186.htmlnvdPatchRelease NotesVendor Advisory
- phabricator.wikimedia.org/T119309nvdPatchThird Party Advisory
- gerrit.wikimedia.org/r/nvdIssue TrackingThird Party Advisory
News mentions
0No linked articles in our index yet.