CVE-2023-44394
PHP vulnerability analysis and mitigation

Overview

MantisBT, an open source bug tracker, was found to contain a vulnerability (CVE-2023-44394) that allows unauthorized users to reveal private Projects' names. The vulnerability exists due to insufficient access-level checks on the Wiki redirection page, where any user can access project names by accessing wiki.php with sequentially incremented IDs. This issue was discovered on September 30, 2023, and has been addressed in release 2.25.8 (Vendor Advisory).

Technical details

The vulnerability stems from improper access control checks in the Wiki redirection functionality. When an integration between MantisBT and DokuWiki is active, users without project permissions can access the page /mantisbt/wiki.php?type=project&id= which triggers a 302 redirection to /dokuwiki/doku.php?id=mantis:. By incrementing the project ID parameter, which uses an auto-increment system, attackers can enumerate and discover project names. The vulnerability has been assigned a CVSS v3.1 Base Score of 4.3 (Medium) with vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N (Vendor Advisory).

Impact

The vulnerability allows unauthorized users to discover and enumerate private project names, which could potentially expose sensitive information such as customer names of software suppliers. Through a simple brute force attack from 1 to 1000, it was possible to retrieve the entire list of projects/customers (MantisBT Issue).

Mitigation and workarounds

The issue has been patched in MantisBT version 2.25.8 through commit 65c44883f. For users unable to upgrade immediately, a workaround is available by disabling wiki integration using the configuration setting $gwikienable = OFF (Vendor Advisory, GitHub Patch).

Additional resources


SourceThis report was generated using AI

Related PHP vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-65854CRITICAL9.8
  • PHPPHP
  • mineadmin/mineadmin
NoNoDec 12, 2025
CVE-2024-58303HIGH8.6
  • PHPPHP
  • fof/pretty-mail
NoNoDec 11, 2025
CVE-2025-67719HIGH8.5
  • PHPPHP
  • ibexa/user
NoYesDec 11, 2025
CVE-2025-67648HIGH7.1
  • PHPPHP
  • shopware/shopware
NoYesDec 11, 2025
CVE-2025-67737LOW3.1
  • PHPPHP
  • azuracast/azuracast
NoYesDec 12, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management