CVE-2023-45362: n/a
An issue was discovered in DifferenceEngine.php in MediaWiki before 1.35.12, 1.36.x through 1.39.x before 1.39.5, and 1.40.x before 1.40.1. diff-multi-sameuser (aka "X intermediate revisions by the same user not shown") ignores username suppression. This is an information leak.
AI Analysis
Technical Summary
CVE-2023-45362 is a vulnerability identified in the DifferenceEngine.php component of MediaWiki, a widely used open-source wiki platform. The issue arises in the diff-multi-sameuser functionality, which is responsible for displaying differences between multiple revisions made by the same user. Specifically, when username suppression is enabled—a privacy feature intended to hide usernames in revision histories—the vulnerability causes intermediate revisions by the same user to be omitted from the displayed diffs. This behavior leads to an information leak because it reveals editing activity that was supposed to be concealed. The affected MediaWiki versions include all releases before 1.35.12, all 1.36.x through 1.39.x versions before 1.39.5, and all 1.40.x versions before 1.40.1. The flaw does not require authentication or user interaction to exploit, making it accessible to any user with read access to the wiki. While no exploits have been reported in the wild, the vulnerability undermines the confidentiality guarantees of username suppression, potentially exposing sensitive editorial metadata. This can be particularly problematic in environments where anonymity or privacy of editors is critical, such as in governmental or corporate wikis. The vulnerability does not directly impact system integrity or availability but compromises privacy and confidentiality of user actions. The absence of a CVSS score necessitates an assessment based on the impact on confidentiality, ease of exploitation, and scope of affected systems. Given the widespread use of MediaWiki in Europe, especially in public sector and educational institutions, this vulnerability poses a moderate risk.
Potential Impact
The primary impact of CVE-2023-45362 is the unintended disclosure of editing activity that users intended to keep private via username suppression. For European organizations, this can lead to breaches of confidentiality, especially in sensitive environments such as government agencies, research institutions, and companies using MediaWiki for internal documentation. Exposure of editing histories can reveal user identities, editing patterns, or sensitive operational details, potentially facilitating targeted social engineering or insider threat activities. Although the vulnerability does not allow direct system compromise or data manipulation, the leakage of metadata can undermine trust in the platform and violate privacy regulations such as GDPR. The risk is heightened in organizations that rely on MediaWiki for collaborative work involving confidential or classified information. Since exploitation does not require authentication, any external or internal user with read access can leverage this flaw, increasing the attack surface. The absence of known exploits suggests limited current threat activity, but the vulnerability remains a latent risk until patched.
Mitigation Recommendations
To mitigate CVE-2023-45362, organizations should promptly upgrade MediaWiki to the fixed versions: 1.35.12 or later, 1.39.5 or later, and 1.40.1 or later depending on their current version branch. Administrators should verify that username suppression settings are correctly configured and test diff displays to ensure intermediate revisions are properly hidden as intended. It is advisable to audit wiki user access controls to restrict read permissions to trusted users only, minimizing exposure. Monitoring wiki logs for unusual access patterns or attempts to enumerate revision histories can help detect exploitation attempts. Additionally, organizations should educate users about the limitations of username suppression and consider alternative privacy controls if necessary. For highly sensitive deployments, consider isolating MediaWiki instances or restricting external access until patches are applied. Maintaining an up-to-date inventory of MediaWiki installations and applying security updates promptly is critical to reducing exposure.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2023-45362: n/a
Description
An issue was discovered in DifferenceEngine.php in MediaWiki before 1.35.12, 1.36.x through 1.39.x before 1.39.5, and 1.40.x before 1.40.1. diff-multi-sameuser (aka "X intermediate revisions by the same user not shown") ignores username suppression. This is an information leak.
AI-Powered Analysis
Technical Analysis
CVE-2023-45362 is a vulnerability identified in the DifferenceEngine.php component of MediaWiki, a widely used open-source wiki platform. The issue arises in the diff-multi-sameuser functionality, which is responsible for displaying differences between multiple revisions made by the same user. Specifically, when username suppression is enabled—a privacy feature intended to hide usernames in revision histories—the vulnerability causes intermediate revisions by the same user to be omitted from the displayed diffs. This behavior leads to an information leak because it reveals editing activity that was supposed to be concealed. The affected MediaWiki versions include all releases before 1.35.12, all 1.36.x through 1.39.x versions before 1.39.5, and all 1.40.x versions before 1.40.1. The flaw does not require authentication or user interaction to exploit, making it accessible to any user with read access to the wiki. While no exploits have been reported in the wild, the vulnerability undermines the confidentiality guarantees of username suppression, potentially exposing sensitive editorial metadata. This can be particularly problematic in environments where anonymity or privacy of editors is critical, such as in governmental or corporate wikis. The vulnerability does not directly impact system integrity or availability but compromises privacy and confidentiality of user actions. The absence of a CVSS score necessitates an assessment based on the impact on confidentiality, ease of exploitation, and scope of affected systems. Given the widespread use of MediaWiki in Europe, especially in public sector and educational institutions, this vulnerability poses a moderate risk.
Potential Impact
The primary impact of CVE-2023-45362 is the unintended disclosure of editing activity that users intended to keep private via username suppression. For European organizations, this can lead to breaches of confidentiality, especially in sensitive environments such as government agencies, research institutions, and companies using MediaWiki for internal documentation. Exposure of editing histories can reveal user identities, editing patterns, or sensitive operational details, potentially facilitating targeted social engineering or insider threat activities. Although the vulnerability does not allow direct system compromise or data manipulation, the leakage of metadata can undermine trust in the platform and violate privacy regulations such as GDPR. The risk is heightened in organizations that rely on MediaWiki for collaborative work involving confidential or classified information. Since exploitation does not require authentication, any external or internal user with read access can leverage this flaw, increasing the attack surface. The absence of known exploits suggests limited current threat activity, but the vulnerability remains a latent risk until patched.
Mitigation Recommendations
To mitigate CVE-2023-45362, organizations should promptly upgrade MediaWiki to the fixed versions: 1.35.12 or later, 1.39.5 or later, and 1.40.1 or later depending on their current version branch. Administrators should verify that username suppression settings are correctly configured and test diff displays to ensure intermediate revisions are properly hidden as intended. It is advisable to audit wiki user access controls to restrict read permissions to trusted users only, minimizing exposure. Monitoring wiki logs for unusual access patterns or attempts to enumerate revision histories can help detect exploitation attempts. Additionally, organizations should educate users about the limitations of username suppression and consider alternative privacy controls if necessary. For highly sensitive deployments, consider isolating MediaWiki instances or restricting external access until patches are applied. Maintaining an up-to-date inventory of MediaWiki installations and applying security updates promptly is critical to reducing exposure.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2023-10-09T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 690a3b5aff58c9332ff08e4a
Added to database: 11/4/2025, 5:43:54 PM
Last enriched: 11/4/2025, 10:12:39 PM
Last updated: 2/4/2026, 10:49:13 AM
Views: 13
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-59818: Vulnerability in Zenitel TCIS-3+
CriticalCVE-2025-41085: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Apidog Apidog Web Platform
MediumCVE-2026-1622: CWE-532 Insertion of Sensitive Information into Log File in neo4j Enterprise Edition
MediumCVE-2026-1370: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in comprassibs SIBS woocommerce payment gateway
MediumCVE-2026-0816: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in gtlwpdev All push notification for WP
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.