VYPR
High severityNVD Advisory· Published Jul 10, 2019· Updated Aug 4, 2024

CVE-2019-12472

CVE-2019-12472

Description

An Incorrect Access Control vulnerability was found in Wikimedia MediaWiki 1.18.0 through 1.32.1. It is possible to bypass the limits on IP range blocks ($wgBlockCIDRLimit) by using the API. Fixed in 1.32.2, 1.31.2, 1.30.2 and 1.27.6.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

MediaWiki 1.18.0 through 1.32.1 allows bypassing IP range block size limits ($wgBlockCIDRLimit) via the API, enabling overly broad blocks.

Vulnerability

Details

An incorrect access control vulnerability exists in Wikimedia MediaWiki versions 1.18.0 through 1.32.1. The issue allows bypassing the configured limits on IP range block sizes, defined by the $wgBlockCIDRLimit setting, when using the API's action=block endpoint. The root cause is that the API no longer checked the $wgBlockCIDRLimit configuration before applying a block, while the normal web interface (Special:Block) still enforced the limits [1][2][3].

Exploitation

To exploit this vulnerability, an attacker must have administrator-level access to the wiki, enabling them to make block API calls. No additional authentication bypass is needed. By crafting an API request with an excessively large CIDR range (e.g., /1 or /2), the attacker can block massive swathes of IP addresses, potentially affecting millions of users, including legitimate editors and visitors [3]. This bypass was discovered in production when a bot on ruwikiquote created blocks covering nearly all IPv4 addresses [3].

Impact

Successful exploitation allows an administrator to block an extremely large IP range (far beyond the intended limit, such as /16 for IPv4), effectively denying access to a significant portion of the internet's address space. This can lead to substantial denial of service, affecting many legitimate users. The vulnerability undermines the administrative controls designed to prevent accidental or malicious mass blocking [2][3].

Mitigation

The vulnerability is fixed in MediaWiki versions 1.32.2, 1.31.2, 1.30.2, and 1.27.6 [1]. Users of older versions should upgrade immediately. Note that MediaWiki 1.30 reached end-of-life in December 2018, and 1.27 in June 2019, so these last security releases are critical for unsupported branches [1]. The fix ensures the API checks $wgBlockCIDRLimit before permitting a block [3].

AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
mediawiki/corePackagist
>= 1.18.0, < 1.27.61.27.6
mediawiki/corePackagist
>= 1.30.0, < 1.30.21.30.2
mediawiki/corePackagist
>= 1.31.0, < 1.31.21.31.2
mediawiki/corePackagist
>= 1.32.0, < 1.32.21.32.2

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.