{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-09T00:41:35.569","vulnerabilities":[{"cve":{"id":"CVE-2021-32722","sourceIdentifier":"security-advisories@github.com","published":"2021-06-28T20:15:07.773","lastModified":"2024-11-21T06:07:36.030","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"GlobalNewFiles is a mediawiki extension. Versions prior to 48be7adb70568e20e961ea1cb70904454a671b1d are affected by an uncontrolled resource consumption vulnerability. A large amount of page moves within a short space of time could overwhelm Database servers due to improper handling of load balancing and a lack of an appropriate index. As a workaround, one may avoid use of the extension unless additional rate limit at the MediaWiki level or via PoolCounter / MySQL is enabled. A patch is available in version 48be7adb70568e20e961ea1cb70904454a671b1d."},{"lang":"es","value":"GlobalNewFiles es una extensión de mediawiki. Las versiones anteriores a la 48be7adb70568e20e961ea1cb70904454a671b1d están afectadas por una vulnerabilidad de consumo incontrolado de recursos. Una gran cantidad de movimientos de páginas en un corto espacio de tiempo podría saturar los servidores de la Base de Datos debido a un manejo inadecuado del balanceo de carga y a la falta de un índice apropiado. Como solución, se puede evitar el uso de la extensión a menos que se habilite un límite de velocidad adicional a nivel de MediaWiki o a través de PoolCounter / MySQL. Hay un parche disponible en la versión 48be7adb70568e20e961ea1cb70904454a671b1d"}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:N/I:N/A:P","baseScore":4.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-400"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-400"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:miraheze:globalnewfiles:*:*:*:*:*:mediawiki:*:*","matchCriteriaId":"F0F9FCDD-C850-45C4-A58F-C24664B53F62"}]}]}],"references":[{"url":"https://github.com/miraheze/GlobalNewFiles/commit/48be7adb70568e20e961ea1cb70904454a671b1d","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/miraheze/GlobalNewFiles/pull/17","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/miraheze/GlobalNewFiles/security/advisories/GHSA-cwv5-c938-5h5h","source":"security-advisories@github.com","tags":["Third Party Advisory"]},{"url":"https://phabricator.miraheze.org/T7532","source":"security-advisories@github.com","tags":["Issue Tracking","Vendor Advisory"]},{"url":"https://github.com/miraheze/GlobalNewFiles/commit/48be7adb70568e20e961ea1cb70904454a671b1d","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/miraheze/GlobalNewFiles/pull/17","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/miraheze/GlobalNewFiles/security/advisories/GHSA-cwv5-c938-5h5h","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://phabricator.miraheze.org/T7532","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking","Vendor Advisory"]}]}}]}