Search for vulnerabilities
Vulnerability details: VCID-4xx5-mty3-cbga
Vulnerability ID VCID-4xx5-mty3-cbga
Aliases CVE-2014-1610
Summary security update
Status Published
Exploitability 2.0
Weighted Severity 0.6
Risk 1.2
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
Data source Metasploit
Description MediaWiki 1.22.x before 1.22.2, 1.21.x before 1.21.5 and 1.19.x before 1.19.11, when DjVu or PDF file upload support is enabled, allows remote unauthenticated users to execute arbitrary commands via shell metacharacters. If no target file is specified this module will attempt to log in with the provided credentials to upload a file (.DjVu) to use for exploitation.
Note
Reliability:
  - unknown-reliability
Stability:
  - unknown-stability
SideEffects:
  - unknown-side-effects
Ransomware campaign use Unknown
Source publication date Jan. 28, 2014
Source URL https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/multi/http/mediawiki_thumb.rb
Data source Exploit-DB
Date added Feb. 1, 2014
Description MediaWiki 1.22.1 PdfHandler - Remote Code Execution
Ransomware campaign use Known
Source publication date Feb. 1, 2014
Exploit type webapps
Platform multiple
Source update date Feb. 1, 2014
There are no known vectors.
Exploit Prediction Scoring System (EPSS)
Percentile 0.97827
EPSS Score 0.52614
Published At July 31, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T09:46:41.501712+00:00 Debian Oval Importer Import https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 37.0.0