Eval injection vulnerability in MediaWiki 1.5.x before 1.5.3 allows remote attackers to execute arbitrary PHP code via the "user language option," which is used as part of a dynamic class name that is processed using the eval function.
2005-12-06T11:03:00.000
2025-04-03T01:03:51.193
Deferred
CVSSv2: 7.5 (HIGH)
AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | mediawiki | mediawiki | 1.5.0 | Yes |
Application | mediawiki | mediawiki | 1.5.1 | Yes |
Application | mediawiki | mediawiki | 1.5.2 | Yes |
Application | mediawiki | mediawiki | 1.5_alpha1 | Yes |
Application | mediawiki | mediawiki | 1.5_alpha2 | Yes |
Application | mediawiki | mediawiki | 1.5_beta1 | Yes |
Application | mediawiki | mediawiki | 1.5_beta2 | Yes |
Application | mediawiki | mediawiki | 1.5_beta3 | Yes |