{"api_version":"1","generated_at":"2026-04-23T07:57:39+00:00","cve":"CVE-2021-29483","urls":{"html":"https://cve.report/CVE-2021-29483","api":"https://cve.report/api/cve/CVE-2021-29483.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-29483","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-29483"},"summary":{"title":"CVE-2021-29483","description":"ManageWiki is an extension to the MediaWiki project. The 'wikiconfig' API leaked the value of private configuration variables set through the ManageWiki variable to all users. This has been patched by https://github.com/miraheze/ManageWiki/compare/99f3b2c8af18...befb83c66f5b.patch. If you are unable to patch set `$wgAPIListModules['wikiconfig'] = 'ApiQueryDisabled';` or remove private config as a workaround.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2021-04-28 22:15:00","updated_at":"2021-05-08 02:26:00"},"problem_types":["CWE-200"],"metrics":[],"references":[{"url":"https://phabricator.miraheze.org/T7213","name":"https://phabricator.miraheze.org/T7213","refsource":"MISC","tags":[],"title":"⚓ T7213 ManageWiki API allows viewing configs that shouldn't be viewed publicly","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/miraheze/ManageWiki/security/advisories/GHSA-jmc9-rv2f-g8vv","name":"https://github.com/miraheze/ManageWiki/security/advisories/GHSA-jmc9-rv2f-g8vv","refsource":"CONFIRM","tags":[],"title":"'wikiconfig' API leaked private config variables set through ManageWiki · Advisory · miraheze/ManageWiki · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/miraheze/ManageWiki/commit/befb83c66f5b643e174897ea41a8a46679b26304","name":"https://github.com/miraheze/ManageWiki/commit/befb83c66f5b643e174897ea41a8a46679b26304","refsource":"MISC","tags":[],"title":"Merge pull request from GHSA-jmc9-rv2f-g8vv · miraheze/ManageWiki@befb83c · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-29483","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-29483","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"29483","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"miraheze","cpe5":"managewiki","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security-advisories@github.com","ID":"CVE-2021-29483","STATE":"PUBLIC","TITLE":"wikiconfig API leaked private config variables set through ManageWiki"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"ManageWiki","version":{"version_data":[{"version_value":"< befb83c66f5b643e174897ea41a8a46679b26304"}]}}]},"vendor_name":"miraheze"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"ManageWiki is an extension to the MediaWiki project. The 'wikiconfig' API leaked the value of private configuration variables set through the ManageWiki variable to all users. This has been patched by https://github.com/miraheze/ManageWiki/compare/99f3b2c8af18...befb83c66f5b.patch. If you are unable to patch set `$wgAPIListModules['wikiconfig'] = 'ApiQueryDisabled';` or remove private config as a workaround."}]},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.4,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"{\"CWE-200\":\"Exposure of Sensitive Information to an Unauthorized Actor\"}"}]}]},"references":{"reference_data":[{"name":"https://github.com/miraheze/ManageWiki/security/advisories/GHSA-jmc9-rv2f-g8vv","refsource":"CONFIRM","url":"https://github.com/miraheze/ManageWiki/security/advisories/GHSA-jmc9-rv2f-g8vv"},{"name":"https://github.com/miraheze/ManageWiki/commit/befb83c66f5b643e174897ea41a8a46679b26304","refsource":"MISC","url":"https://github.com/miraheze/ManageWiki/commit/befb83c66f5b643e174897ea41a8a46679b26304"},{"name":"https://phabricator.miraheze.org/T7213","refsource":"MISC","url":"https://phabricator.miraheze.org/T7213"}]},"source":{"advisory":"GHSA-jmc9-rv2f-g8vv","discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2021-04-28 22:15:00","lastModifiedDate":"2021-05-08 02:26:00","problem_types":["CWE-200"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5},"severity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:miraheze:managewiki:*:*:*:*:*:*:*:*","versionEndExcluding":"2021-04-28","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"29483","Ordinal":"204687","Title":"CVE-2021-29483","CVE":"CVE-2021-29483","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"29483","Ordinal":"1","NoteData":"ManageWiki is an extension to the MediaWiki project. The 'wikiconfig' API leaked the value of private configuration variables set through the ManageWiki variable to all users. This has been patched by https://github.com/miraheze/ManageWiki/compare/99f3b2c8af18...befb83c66f5b.patch. If you are unable to patch set `$wgAPIListModules['wikiconfig'] = 'ApiQueryDisabled';` or remove private config as a workaround.","Type":"Description","Title":null},{"CveYear":"2021","CveId":"29483","Ordinal":"2","NoteData":"2021-04-28","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"29483","Ordinal":"3","NoteData":"2021-04-28","Type":"Other","Title":"Modified"}]}}}