Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-34506: n/a

0
High
VulnerabilityCVE-2024-34506cvecve-2024-34506
Published: Sun May 05 2024 (05/05/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in includes/specials/SpecialMovePage.php in MediaWiki before 1.39.7, 1.40.x before 1.40.3, and 1.41.x before 1.41.1. If a user with the necessary rights to move the page opens Special:MovePage for a page with tens of thousands of subpages, then the page will exceed the maximum request time, leading to a denial of service.

AI-Powered Analysis

AILast updated: 11/04/2025, 17:56:02 UTC

Technical Analysis

CVE-2024-34506 is a denial of service vulnerability identified in the MediaWiki software, specifically within the includes/specials/SpecialMovePage.php file. The issue arises when a user who has the necessary permissions to move pages attempts to move a page that contains a very large number of subpages—on the order of tens of thousands. The process of loading and handling this large number of subpages during the move operation causes the request to exceed the maximum allowed execution time on the server, leading to a denial of service condition. This vulnerability affects MediaWiki versions before 1.39.7, 1.40.x before 1.40.3, and 1.41.x before 1.41.1. The CVSS v3.1 score is 7.5 (high severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no confidentiality or integrity impact (C:N/I:N), and high impact on availability (A:H). Exploitation requires an authenticated user with move page rights but does not require additional user interaction beyond initiating the move. The vulnerability is classified under CWE-400 (Uncontrolled Resource Consumption), indicating that the root cause is excessive resource usage leading to service disruption. No known public exploits have been reported yet. The vulnerability can cause significant service disruption for MediaWiki instances managing large hierarchical content structures, especially in environments where page moves are common administrative tasks. The absence of patches in the provided data suggests that upgrading to the specified fixed versions or applying vendor patches when available is the recommended remediation.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the availability of MediaWiki-based services. MediaWiki is widely used in public sector, educational institutions, and enterprises across Europe for collaborative documentation and knowledge management. A denial of service caused by this vulnerability could disrupt internal and external wiki services, impacting operational continuity and information access. Organizations with large-scale MediaWiki deployments containing extensive page hierarchies are particularly vulnerable, as the move operation on pages with tens of thousands of subpages triggers the issue. This could lead to administrative delays and potential downtime, affecting workflows dependent on wiki content management. While confidentiality and integrity are not impacted, the availability disruption could have cascading effects on business processes, especially in government agencies and research institutions that rely heavily on MediaWiki. The requirement for authenticated users with move rights limits the attack surface but insider threats or compromised accounts could exploit this vulnerability. The lack of known exploits reduces immediate risk but does not eliminate the potential for future exploitation.

Mitigation Recommendations

European organizations should prioritize upgrading MediaWiki installations to versions 1.39.7, 1.40.3, or 1.41.1 and later, where this vulnerability is addressed. Until upgrades are applied, administrators should restrict move page permissions to trusted users only and monitor for unusual move operations involving pages with large numbers of subpages. Implementing rate limiting or timeout controls on the Special:MovePage functionality can help mitigate excessive resource consumption. Organizations should audit their wiki content to identify pages with large subpage counts and avoid moving these pages unless necessary. Additionally, consider segmenting large wiki structures to reduce the number of subpages under a single page. Monitoring server performance and logs for signs of denial of service attempts related to page moves is recommended. If possible, disable or restrict the Special:MovePage feature temporarily in high-risk environments until patches are applied. Finally, maintain awareness of vendor advisories and apply patches promptly when released.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2024-05-05T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a3b50ff58c9332ff073d1

Added to database: 11/4/2025, 5:43:44 PM

Last enriched: 11/4/2025, 5:56:02 PM

Last updated: 11/5/2025, 2:04:55 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats