Vulnerability Description
Inefficient Regular Expression Complexity vulnerability in Wikimedia Foundation MediaWiki - VisualData Extension allows Regular Expression Exponential Blowup.This issue affects MediaWiki - VisualData Extension: 1.45.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wikisphere | Visualdata | - |
| Mediawiki | Mediawiki | 1.45.0 |
Related Weaknesses (CWE)
References
- https://gerrit.wikimedia.org/r/q/I4ff2737c9f0ba805267d1fc8296e7cff61241ee3Patch
- https://gerrit.wikimedia.org/r/q/I893a9fca694a2613e29e149dea2d76d7f06063e5Patch
- https://gerrit.wikimedia.org/r/q/Ie08d9a8ceb2c9a22a635cfc27964353f14072dbfPatch
- https://gerrit.wikimedia.org/r/q/Ifbf9c2ade621226e14fe852f3217293772bf8bb8Patch
- https://phabricator.wikimedia.org/T387008ExploitIssue Tracking
FAQ
What is CVE-2026-0668?
CVE-2026-0668 is a vulnerability with a CVSS score of 5.3 (MEDIUM). Inefficient Regular Expression Complexity vulnerability in Wikimedia Foundation MediaWiki - VisualData Extension allows Regular Expression Exponential Blowup.This issue affects MediaWiki - VisualData ...
How severe is CVE-2026-0668?
CVE-2026-0668 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-0668?
Check the references section above for vendor advisories and patch information. Affected products include: Wikisphere Visualdata, Mediawiki Mediawiki.