Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:mediawiki:mediawiki:1.39.0:-:*:*:*:*:*:*", "matchCriteriaId": "243E4420-7054-4190-8270-76E09207FC9C", "vulnerable": true}, {"criteria": "cpe:2.3:a:mediawiki:mediawiki:1.39.0:rc0:*:*:*:*:*:*", "matchCriteriaId": "90D9672A-851F-46B0-AA0D-35991D7802E6", "vulnerable": true}, {"criteria": "cpe:2.3:a:mediawiki:mediawiki:1.39.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "5141FCFC-D842-49B8-9385-5EE2DB6E7BFA", "vulnerable": true}, {"criteria": "cpe:2.3:a:mediawiki:mediawiki:1.39.1:*:*:*:*:*:*:*", "matchCriteriaId": "4A716F56-5EB8-4ECA-9F7E-A701AA0D89EF", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "An issue was discovered in the CheckUser extension for MediaWiki through 1.39.x. Various components of this extension can expose information on the performer of edits and logged actions. This information should not allow public viewing: it is supposed to be viewable only by users with suppression rights."}, {"lang": "es", "value": "Se descubri\u00f3 un problema en la extensi\u00f3n CheckUser para MediaWiki hasta 1.39.x. Varios componentes de esta extensi\u00f3n pueden exponer informaci\u00f3n sobre qui\u00e9n realiza las ediciones y las acciones registradas. Esta informaci\u00f3n no deber\u00eda permitir la visualizaci\u00f3n p\u00fablica: se supone que s\u00f3lo debe ser visible para usuarios con derechos de supresi\u00f3n."}], "id": "CVE-2022-39193", "lastModified": "2025-04-03T16:15:23.657", "metrics": {"cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1"}, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary"}, {"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1"}, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary"}]}, "published": "2023-01-20T19:15:15.250", "references": [{"source": "cve@mitre.org", "tags": ["Exploit", "Issue Tracking", "Patch", "Third Party Advisory"], "url": "https://phabricator.wikimedia.org/T311337"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Issue Tracking", "Patch", "Third Party Advisory"], "url": "https://phabricator.wikimedia.org/T311337"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-200"}], "source": "nvd@nist.gov", "type": "Primary"}, {"description": [{"lang": "en", "value": "CWE-200"}], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary"}]}