Search for vulnerabilities
Vulnerability details: VCID-tr2g-xya5-aaaj
Vulnerability ID VCID-tr2g-xya5-aaaj
Aliases CVE-2022-28201
Summary An issue was discovered in MediaWiki before 1.35.6, 1.36.x before 1.36.4, and 1.37.x before 1.37.2. Users with the editinterface permission can trigger infinite recursion, because a bare local interwiki is mishandled for the mainpage message.
Status Published
Exploitability 0.5
Weighted Severity 6.2
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.00032 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.00032 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.00032 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.00032 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.00032 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.00032 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.00060 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.00060 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.00060 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.00060 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.00060 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.00060 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.00060 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.00060 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.00060 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.00060 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.00060 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.00060 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.00060 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2022-28201
cvssv3 4.4 https://nvd.nist.gov/vuln/detail/CVE-2022-28201
cvssv3.1 4.4 https://nvd.nist.gov/vuln/detail/CVE-2022-28201
archlinux Unknown https://security.archlinux.org/AVG-2823
cvssv3.1 7.7 https://www.debian.org/security/2022/dsa-5246
generic_textual HIGH https://www.debian.org/security/2022/dsa-5246
Reference id Reference type URL
https://api.first.org/data/v1/epss?cve=CVE-2022-28201
https://blog.legoktm.com/2022/07/03/a-belated-writeup-of-cve-2022-28201-in-mediawiki.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44854
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44856
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28201
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28202
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28203
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29248
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31042
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31043
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31090
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31091
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34911
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34912
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41765
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41767
https://lists.debian.org/debian-lts-announce/2022/09/msg00027.html
https://phabricator.wikimedia.org/T297571
https://www.debian.org/security/2022/dsa-5246
AVG-2823 https://security.archlinux.org/AVG-2823
cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
CVE-2022-28201 https://nvd.nist.gov/vuln/detail/CVE-2022-28201
No exploits are available.
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2022-28201
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2022-28201
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://www.debian.org/security/2022/dsa-5246
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.04558
EPSS Score 0.00027
Published At March 28, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.