AbuseFilter misuses ::userCanBitfield, exposing access-controlled information
Summary
| CVE | CVE-2026-34086 |
|---|---|
| State | PUBLISHED |
| Assigner | wikimedia-foundation |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-05-11 16:17:29 UTC |
| Updated | 2026-05-12 14:45:49 UTC |
| Description | Vulnerability in Wikimedia Foundation AbuseFilter. This issue affects AbuseFilter: from * before 1.43.7, 1.44.4, 1.45.2. |
Risk And Classification
Primary CVSS: v4.0 2.1 LOW from c4f26cc8-17ff-4c99-b5e2-38fc1793eacc
CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:Y/R:X/V:X/RE:X/U:X
EPSS: 0.000840000 probability, percentile 0.242530000 (date 2026-05-12)
Problem Types: CWE-20 | CWE-20 CWE-20 Improper Input Validation
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 4.0 | c4f26cc8-17ff-4c99-b5e2-38fc1793eacc | Secondary | 2.1 | LOW | CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/C... |
| 4.0 | CNA | CVSS | 2.1 | LOW | CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/S:N/AU:Y |
CVSS v4.0 Breakdown
Attack Vector
NetworkAttack Complexity
HighAttack Requirements
PresentPrivileges Required
LowUser Interaction
PassiveConfidentiality
LowIntegrity
LowAvailability
NoneSub Conf.
LowSub Integrity
LowSub Availability
NoneCVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:Y/R:X/V:X/RE:X/U:X
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Wikimedia Foundation | AbuseFilter | affected * 1.43.7, 1.44.4, 1.45.2 semver | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| phabricator.wikimedia.org/T415584 | c4f26cc8-17ff-4c99-b5e2-38fc1793eacc | phabricator.wikimedia.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.