VYPR
Moderate severityNVD Advisory· Published Oct 4, 2024· Updated Dec 6, 2024

CVE-2024-47913

CVE-2024-47913

Description

An issue was discovered in the AbuseFilter extension for MediaWiki before 1.39.9, 1.40.x and 1.41.x before 1.41.3, and 1.42.x before 1.42.2. An API caller can match a filter condition against AbuseFilter logs even if the caller is not authorized to view the log details for the filter.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

MediaWiki AbuseFilter API fails to enforce the abusefilter-log-detail permission, allowing unauthorized users to match filter conditions against log entries.

Root

Cause CVE-2024-47913 is an authorization bypass vulnerability in the AbuseFilter extension for MediaWiki. The abusefiltercheckmatch API endpoint does not verify that the caller possesses the abusefilter-log-detail right before matching a filter condition against the details of logged AbuseFilter actions [1][3]. This missing permission check was introduced in code changes prior to MediaWiki versions 1.39.9, 1.40.4, 1.41.3, and 1.42.2 [1].

Exploitation

The vulnerability can be exploited by any API caller with network access to a vulnerable MediaWiki instance. The attacker does not need special privileges beyond the ability to make API requests; they simply call the abusefiltercheckmatch endpoint with a crafted filter condition and a reference to an AbuseFilter log entry [1][3]. Because the permission check is absent, the API will return a result indicating whether the given condition matches the log entry's details, regardless of the caller's authorization to view those details.

Impact

An unauthenticated or low-privileged API caller can effectively probe AbuseFilter logs to learn information about filtered actions. This could reveal details such as the target IP addresses of temporary users, patterns of abuse, or other sensitive data that is normally restricted to users with the abusefilter-log-detail right [3]. The information leakage can be used to infer which filters are active or to correlate actions with specific user sessions.

Mitigation

The vulnerability has been addressed in MediaWiki point releases: 1.39.9, 1.40.4 (for the 1.40.x branch), 1.41.3, and 1.42.2 [1]. Administrators are strongly advised to upgrade to these patched versions immediately. No workarounds are documented; the fix ensures that the abisuefiltercheckmatch API properly checks the abusefilter-log-detail right before processing any match against log details [3].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
mediawiki/abuse-filterPackagist
< 1.39.91.39.9
mediawiki/abuse-filterPackagist
>= 1.40.0, < 1.41.31.41.3
mediawiki/abuse-filterPackagist
>= 1.42.0, < 1.42.21.42.2

Affected products

3

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.