CVE-2023-29141
Description
An issue was discovered in MediaWiki before 1.35.10, 1.36.x through 1.38.x before 1.38.6, and 1.39.x before 1.39.3. An auto-block can occur for an untrusted X-Forwarded-For header.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
MediaWiki before 1.35.10, 1.38.6, and 1.39.3 improperly processes untrusted X-Forwarded-For headers, potentially triggering unwanted auto-blocks.
The vulnerability CVE-2023-29141 resides in MediaWiki's handling of the X-Forwarded-For HTTP header. The software incorrectly trusts the value of this header when determining the client's IP address for automatic blocking purposes. An attacker can supply a spoofed X-Forwarded-For header containing an arbitrary IP address, leading MediaWiki's auto-block mechanism to act on that crafted address. [1]
To exploit this flaw, an attacker needs to be able to send HTTP requests with a manipulated X-Forwarded-For header to a vulnerable MediaWiki instance. No authentication is required because the auto-block logic is triggered by request metadata before any permissions check. The attack surface is the public-facing web interface; any request reaching the wiki can carry a spoofed header. [2]
Successful exploitation causes MediaWiki to auto-block the IP address injected into the X-Forwarded-For header, potentially blocking legitimate users or administrators who share that IP range. The impact is a denial of service against valid users, as their IP becomes subject to a block erroneously attributed by the forged header. [3]
MediaWiki addressed the issue in versions 1.35.10, 1.38.6, and 1.39.3, released in March 2023. Administrators running older builds should upgrade immediately to one of these patched releases or a later version. The fix likely involves sanitizing or ignoring untrusted proxy headers for block decisions. [1][4]
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
mediawiki/corePackagist | >= 1.39.0, < 1.39.3 | 1.39.3 |
mediawiki/corePackagist | >= 1.38.0, < 1.38.6 | 1.38.6 |
mediawiki/corePackagist | < 1.35.10 | 1.35.10 |
Affected products
3- MediaWiki/MediaWikidescription
- osv-coords2 versions
< 1.35.10+ 1 more
- (no CPE)range: < 1.35.10
- (no CPE)range: >= 1.39.0, < 1.39.3
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
13- github.com/advisories/GHSA-5vj8-g3qg-4qh6ghsaADVISORY
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ONWHGOBFD6CQAEGOP5O375XAP2N6RUHT/mitrevendor-advisory
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZGK4NZPIJ5ET2ANRZOUYPCRIB5I64JR7/mitrevendor-advisory
- nvd.nist.gov/vuln/detail/CVE-2023-29141ghsaADVISORY
- www.debian.org/security/2023/dsa-5447ghsavendor-advisoryWEB
- gerrit.wikimedia.org/r/plugins/gitiles/mediawiki/core/+/REL1_39/RELEASE-NOTES-1.39ghsaWEB
- lists.debian.org/debian-lts-announce/2023/08/msg00029.htmlghsamailing-listWEB
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONWHGOBFD6CQAEGOP5O375XAP2N6RUHTghsaWEB
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZGK4NZPIJ5ET2ANRZOUYPCRIB5I64JR7ghsaWEB
- phabricator.wikimedia.org/T285159ghsaWEB
- www.mediawiki.org/wiki/Release_notes/1.35ghsaWEB
- www.mediawiki.org/wiki/Release_notes/1.38ghsaWEB
- www.mediawiki.org/wiki/Release_notes/1.39ghsaWEB
News mentions
0No linked articles in our index yet.