Skip to main content

CVE-2022-28204: n/a in n/a

High
VulnerabilityCVE-2022-28204cvecve-2022-28204
Published: Mon Sep 19 2022 (09/19/2022, 20:48:09 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: n/a

Description

A denial-of-service issue was discovered in MediaWiki 1.37.x before 1.37.2. Rendering of w/index.php?title=Special%3AWhatLinksHere&target=Property%3AP31&namespace=1&invert=1 can take more than thirty seconds. There is a DDoS risk.

AI-Powered Analysis

AILast updated: 07/07/2025, 23:12:47 UTC

Technical Analysis

CVE-2022-28204 is a high-severity denial-of-service (DoS) vulnerability affecting MediaWiki versions 1.37.x prior to 1.37.2. The vulnerability arises from the inefficient rendering process of a specific URL endpoint: w/index.php?title=Special%3AWhatLinksHere&target=Property%3AP31&namespace=1&invert=1. This endpoint is used to display pages that link to a particular property within the MediaWiki instance. Due to the way MediaWiki processes this request, rendering can take more than thirty seconds, which is significantly longer than normal response times. This prolonged processing time can be exploited by attackers to overwhelm the server with multiple such requests, leading to a denial-of-service condition. The vulnerability is classified under CWE-400, which relates to uncontrolled resource consumption, indicating that the root cause is excessive resource usage triggered by crafted requests. The CVSS v3.1 base score is 7.5, reflecting a high severity level, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but high impact on availability (A:H). There are no known exploits in the wild as of the published date, and no vendor or product name is explicitly provided, but the affected software is MediaWiki, a widely used open-source wiki platform. No patch links are provided, but the fixed version is 1.37.2, indicating that upgrading to this or later versions mitigates the issue.

Potential Impact

For European organizations using MediaWiki 1.37.x versions prior to 1.37.2, this vulnerability presents a significant risk of service disruption. MediaWiki is commonly used for internal knowledge bases, documentation, and collaborative content management in enterprises, educational institutions, and government agencies. A successful exploitation could lead to denial-of-service conditions, rendering the wiki inaccessible to legitimate users. This can disrupt business operations, knowledge sharing, and critical documentation access. Given that no authentication or user interaction is required to trigger the vulnerability, attackers can remotely launch denial-of-service attacks over the network, potentially from anywhere. This increases the attack surface and risk of widespread disruption. Additionally, the prolonged server processing could increase resource consumption, potentially leading to increased operational costs or collateral impact on other services hosted on the same infrastructure. While no confidentiality or integrity impact is noted, availability degradation alone can have serious operational consequences, especially for organizations relying heavily on MediaWiki for daily workflows.

Mitigation Recommendations

European organizations should prioritize upgrading MediaWiki installations to version 1.37.2 or later, where this vulnerability is addressed. If immediate upgrade is not feasible, organizations can implement rate limiting on the affected URL endpoint to restrict the number of requests per IP address, thereby reducing the risk of resource exhaustion. Web application firewalls (WAFs) can be configured to detect and block suspicious patterns targeting the Special:WhatLinksHere page with the specific query parameters involved. Monitoring server performance and logs for unusually long response times or spikes in requests to this endpoint can provide early detection of exploitation attempts. Additionally, organizations should consider isolating MediaWiki servers behind reverse proxies or load balancers that can absorb or mitigate volumetric attacks. Regular security audits and vulnerability scanning should include checks for this CVE to ensure timely remediation. Finally, educating administrators about the risks of exposing such endpoints publicly without protection can reduce attack vectors.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-03-30T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683880c6182aa0cae2839693

Added to database: 5/29/2025, 3:44:06 PM

Last enriched: 7/7/2025, 11:12:47 PM

Last updated: 8/11/2025, 12:08:24 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats