CVE-2012-4381
Linux Debian vulnerability analysis and mitigation

Overview

MediaWiki before 1.18.5, and 1.19.x before 1.19.2 saves passwords in the local database, which could make it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack. Additionally, when an authentication plugin returns false in the strict function, remote attackers could use old passwords for non-existing accounts in an external authentication system (Debian Security, Wikimedia Bug).

Technical details

The vulnerability stems from password data being always saved to the local MediaWiki database, even when authentication is handled by an external extension like LDAP. This could allow a compromised MediaWiki installation to leak information about user's LDAP passwords. The issue was discovered during internal review and affects MediaWiki versions before 1.18.5 and 1.19.x before 1.19.2 (MediaWiki Announce).

Impact

The vulnerability could allow attackers with access to a compromised MediaWiki installation to leak information about user's external authentication system passwords (like LDAP passwords). Additionally, in situations where an authentication plugin returned false in its strict function, attackers could potentially use old passwords for accounts that did not exist in the external system indefinitely (MediaWiki Announce).

Mitigation and workarounds

The issue was fixed in MediaWiki versions 1.18.5 and 1.19.2. For affected installations, administrators were advised to purge password data from the database using the SQL command 'UPDATE user SET user_password='''. For installations with mixed authentication, administrators needed to selectively purge passwords only for external authentication users (Phabricator).

Additional resources


SourceThis report was generated using AI

Related Linux Debian vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22857MEDIUM6.8
  • Linux DebianLinux Debian
  • libwinpr
NoNoJan 14, 2026
CVE-2026-22856MEDIUM6.8
  • Linux DebianLinux Debian
  • freerdp3
NoNoJan 14, 2026
CVE-2026-22859MEDIUM5.6
  • Linux DebianLinux Debian
  • freerdp2
NoNoJan 14, 2026
CVE-2026-22858MEDIUM5.6
  • Linux DebianLinux Debian
  • freerdp-plugins
NoNoJan 14, 2026
CVE-2026-22036LOW3.7
  • JavaScriptJavaScript
  • node-undici
NoYesJan 14, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management