Debian Dokuwiki vulnerabilities

40 known vulnerabilities affecting debian/dokuwiki.

Total CVEs
40
CISA KEV
0
Public exploits
4
Exploited in wild
1
Severity breakdown
HIGH2MEDIUM20LOW18

Vulnerabilities

Page 1 of 2
CVE-2026-26477MEDIUMCVSS 4.32026
CVE-2026-26477 [MEDIUM] CVE-2026-26477: dokuwiki - An issue in Dokuwiki v.2025-05-14b "Librarian" [56.2] allows a remote attacker t... An issue in Dokuwiki v.2025-05-14b "Librarian" [56.2] allows a remote attacker to cause a denial of service via the media_upload_xhr() function in the media.php file Scope: local bookworm: undetermined bullseye: undetermined forky: undetermined sid: undetermined trixie: undetermined
debian
CVE-2025-61224MEDIUMCVSS 6.5fixed in dokuwiki 2025-05-14.b+dfsg-1 (forky)2025
CVE-2025-61224 [MEDIUM] CVE-2025-61224: dokuwiki - Cross Site Scripting vulnerability in DokuWiki 2025-05-14a 'Librarian'[56.1] all... Cross Site Scripting vulnerability in DokuWiki 2025-05-14a 'Librarian'[56.1] allows a remote attacker to execute arbitrary code via the q parameter Scope: local bookworm: open bullseye: open forky: resolved (fixed in 2025-05-14.b+dfsg-1) sid: resolved (fixed in 2025-05-14.b+dfsg-1) trixie: open
debian
CVE-2024-33103LOWCVSS 6.12024
CVE-2024-33103 [MEDIUM] CVE-2024-33103: dokuwiki - An arbitrary file upload vulnerability in the Media Manager component of DokuWik... An arbitrary file upload vulnerability in the Media Manager component of DokuWiki 2024-02-06a allows attackers to execute arbitrary code by uploading a crafted SVG file. NOTE: as noted in the 4267 issue reference, there is a position that exploitability can only occur with a misconfiguration of the product. Scope: local bookworm: open bullseye: open forky: open s
debian
CVE-2023-34408MEDIUMCVSS 5.4fixed in dokuwiki 0.0.20220731.a-2 (bookworm)2023
CVE-2023-34408 [MEDIUM] CVE-2023-34408: dokuwiki - DokuWiki before 2023-04-04a allows XSS via RSS titles. DokuWiki before 2023-04-04a allows XSS via RSS titles. Scope: local bookworm: resolved (fixed in 0.0.20220731.a-2) bullseye: open forky: resolved (fixed in 0.0.20220731.a-2) sid: resolved (fixed in 0.0.20220731.a-2) trixie: resolved (fixed in 0.0.20220731.a-2)
debian
CVE-2022-28919MEDIUMCVSS 6.1fixed in dokuwiki 0.0.20220731.a-1 (bookworm)2022
CVE-2022-28919 [MEDIUM] CVE-2022-28919: dokuwiki - HTMLCreator release_stable_2020-07-29 was discovered to contain a cross-site scr... HTMLCreator release_stable_2020-07-29 was discovered to contain a cross-site scripting (XSS) vulnerability via the function _generateFilename. Scope: local bookworm: resolved (fixed in 0.0.20220731.a-1) bullseye: open forky: resolved (fixed in 0.0.20220731.a-1) sid: resolved (fixed in 0.0.20220731.a-1) trixie: resolved (fixed in 0.0.20220731.a-1)
debian
CVE-2022-3123LOWCVSS 6.12022
CVE-2022-3123 [MEDIUM] CVE-2022-3123: dokuwiki - Cross-site Scripting (XSS) - Reflected in GitHub repository splitbrain/dokuwiki ... Cross-site Scripting (XSS) - Reflected in GitHub repository splitbrain/dokuwiki prior to 2022-07-31a. Scope: local bookworm: resolved bullseye: resolved forky: resolved sid: resolved trixie: resolved
debian
CVE-2019-25338MEDIUMCVSS 6.92019
CVE-2019-25338 [MEDIUM] CVE-2019-25338: dokuwiki - DokuWiki 2018-04-22b contains a username enumeration vulnerability in its passwo... DokuWiki 2018-04-22b contains a username enumeration vulnerability in its password reset functionality that allows attackers to identify valid user accounts. Attackers can submit different usernames to the password reset endpoint and distinguish between existing and non-existing accounts by analyzing the server's error response messages. Scope: local bookworm: un
debian
CVE-2017-18123HIGHCVSS 8.6fixed in dokuwiki 0.0.20160626.a-2.1 (bookworm)2017
CVE-2017-18123 [HIGH] CVE-2017-18123: dokuwiki - The call parameter of /lib/exe/ajax.php in DokuWiki through 2017-02-19e does not... The call parameter of /lib/exe/ajax.php in DokuWiki through 2017-02-19e does not properly encode user input, which leads to a reflected file download vulnerability, and allows remote attackers to run arbitrary programs. Scope: local bookworm: resolved (fixed in 0.0.20160626.a-2.1) bullseye: resolved (fixed in 0.0.20160626.a-2.1) forky: resolved (fixed in 0.0.201606
debian
CVE-2017-12583MEDIUMCVSS 6.1PoCfixed in dokuwiki 0.0.20180422.a-1 (bookworm)2017
CVE-2017-12583 [MEDIUM] CVE-2017-12583: dokuwiki - DokuWiki through 2017-02-19b has XSS in the at parameter (aka the DATE_AT variab... DokuWiki through 2017-02-19b has XSS in the at parameter (aka the DATE_AT variable) to doku.php. Scope: local bookworm: resolved (fixed in 0.0.20180422.a-1) bullseye: resolved (fixed in 0.0.20180422.a-1) forky: resolved (fixed in 0.0.20180422.a-1) sid: resolved (fixed in 0.0.20180422.a-1) trixie: resolved (fixed in 0.0.20180422.a-1)
debian
CVE-2017-12980MEDIUMCVSS 6.1fixed in dokuwiki 0.0.20180422.a-1 (bookworm)2017
CVE-2017-12980 [MEDIUM] CVE-2017-12980: dokuwiki - DokuWiki through 2017-02-19c has stored XSS when rendering a malicious RSS or At... DokuWiki through 2017-02-19c has stored XSS when rendering a malicious RSS or Atom feed, in /inc/parser/xhtml.php. An attacker can create or edit a wiki that uses RSS or Atom data from an attacker-controlled server to trigger JavaScript execution. The JavaScript can be in an author field, as demonstrated by the dc:creator element. Scope: local bookworm: resolved
debian
CVE-2017-12979MEDIUMCVSS 6.1fixed in dokuwiki 0.0.20180422.a-1 (bookworm)2017
CVE-2017-12979 [MEDIUM] CVE-2017-12979: dokuwiki - DokuWiki through 2017-02-19c has stored XSS when rendering a malicious language ... DokuWiki through 2017-02-19c has stored XSS when rendering a malicious language name in a code element, in /inc/parser/xhtml.php. An attacker can create or edit a wiki with this element to trigger JavaScript execution. Scope: local bookworm: resolved (fixed in 0.0.20180422.a-1) bullseye: resolved (fixed in 0.0.20180422.a-1) forky: resolved (fixed in 0.0.20180422.
debian
CVE-2016-7964LOWCVSS 8.6fixed in dokuwiki 2024-02-06b+dfsg-7 (forky)2016
CVE-2016-7964 [HIGH] CVE-2016-7964: dokuwiki - The sendRequest method in HTTPClient Class in file /inc/HTTPClient.php in DokuWi... The sendRequest method in HTTPClient Class in file /inc/HTTPClient.php in DokuWiki 2016-06-26a and older, when media file fetching is enabled, has no way to restrict access to private networks. This allows users to scan ports of internal networks via SSRF, such as 10.0.0.1/8, 172.16.0.0/12, and 192.168.0.0/16. Scope: local bookworm: open bullseye: open forky: resolve
debian
CVE-2016-7965LOWCVSS 6.5fixed in dokuwiki 2024-02-06b+dfsg-7 (forky)2016
CVE-2016-7965 [MEDIUM] CVE-2016-7965: dokuwiki - DokuWiki 2016-06-26a and older uses $_SERVER[HTTP_HOST] instead of the baseurl s... DokuWiki 2016-06-26a and older uses $_SERVER[HTTP_HOST] instead of the baseurl setting as part of the password-reset URL. This can lead to phishing attacks. (A remote unauthenticated attacker can change the URL's hostname via the HTTP Host header.) The vulnerability can be triggered only if the Host header is not part of the web server routing process (e.g., if sev
debian
CVE-2015-2172MEDIUMCVSS 6.5fixed in dokuwiki 0.0.20140929.d-1 (bookworm)2015
CVE-2015-2172 [MEDIUM] CVE-2015-2172: dokuwiki - DokuWiki before 2014-05-05d and before 2014-09-29c does not properly check permi... DokuWiki before 2014-05-05d and before 2014-09-29c does not properly check permissions for the ACL plugins, which allows remote authenticated users to gain privileges and add or delete ACL rules via a request to the XMLRPC API. Scope: local bookworm: resolved (fixed in 0.0.20140929.d-1) bullseye: resolved (fixed in 0.0.20140929.d-1) forky: resolved (fixed in 0.0.20
debian
CVE-2014-8761MEDIUMCVSS 5.0fixed in dokuwiki 0.0.20140505.a+dfsg-1 (bookworm)2014
CVE-2014-8761 [MEDIUM] CVE-2014-8761: dokuwiki - inc/template.php in DokuWiki before 2014-05-05a only checks for access to the ro... inc/template.php in DokuWiki before 2014-05-05a only checks for access to the root namespace, which allows remote attackers to access arbitrary images via a media file details ajax call. Scope: local bookworm: resolved (fixed in 0.0.20140505.a+dfsg-1) bullseye: resolved (fixed in 0.0.20140505.a+dfsg-1) forky: resolved (fixed in 0.0.20140505.a+dfsg-1) sid: resolved
debian
CVE-2014-8762MEDIUMCVSS 5.0fixed in dokuwiki 0.0.20140505.a+dfsg-1 (bookworm)2014
CVE-2014-8762 [MEDIUM] CVE-2014-8762: dokuwiki - The ajax_mediadiff function in DokuWiki before 2014-05-05a allows remote attacke... The ajax_mediadiff function in DokuWiki before 2014-05-05a allows remote attackers to access arbitrary images via a crafted namespace in the ns parameter. Scope: local bookworm: resolved (fixed in 0.0.20140505.a+dfsg-1) bullseye: resolved (fixed in 0.0.20140505.a+dfsg-1) forky: resolved (fixed in 0.0.20140505.a+dfsg-1) sid: resolved (fixed in 0.0.20140505.a+dfsg-1)
debian
CVE-2014-8763MEDIUMCVSS 5.0fixed in dokuwiki 0.0.20140929.a-1 (bookworm)2014
CVE-2014-8763 [MEDIUM] CVE-2014-8763: dokuwiki - DokuWiki before 2014-05-05b, when using Active Directory for LDAP authentication... DokuWiki before 2014-05-05b, when using Active Directory for LDAP authentication, allows remote attackers to bypass authentication via a password starting with a null (\0) character and a valid user name, which triggers an unauthenticated bind. Scope: local bookworm: resolved (fixed in 0.0.20140929.a-1) bullseye: resolved (fixed in 0.0.20140929.a-1) forky: resolved
debian
CVE-2014-9253MEDIUMCVSS 4.3fixed in dokuwiki 0.0.20140929.d-1 (bookworm)2014
CVE-2014-9253 [MEDIUM] CVE-2014-9253: dokuwiki - The default file type whitelist configuration in conf/mime.conf in the Media Man... The default file type whitelist configuration in conf/mime.conf in the Media Manager in DokuWiki before 2014-09-29b allows remote attackers to execute arbitrary web script or HTML by uploading an SWF file, then accessing it via the media parameter to lib/exe/fetch.php. Scope: local bookworm: resolved (fixed in 0.0.20140929.d-1) bullseye: resolved (fixed in 0.0.2014
debian
CVE-2014-8764MEDIUMCVSS 5.0fixed in dokuwiki 0.0.20140929.a-1 (bookworm)2014
CVE-2014-8764 [MEDIUM] CVE-2014-8764: dokuwiki - DokuWiki 2014-05-05a and earlier, when using Active Directory for LDAP authentic... DokuWiki 2014-05-05a and earlier, when using Active Directory for LDAP authentication, allows remote attackers to bypass authentication via a user name and password starting with a null (\0) character, which triggers an anonymous bind. Scope: local bookworm: resolved (fixed in 0.0.20140929.a-1) bullseye: resolved (fixed in 0.0.20140929.a-1) forky: resolved (fixed i
debian
CVE-2012-3354LOWCVSS 4.3fixed in dokuwiki 0.0.20130510a-1 (bookworm)2012
CVE-2012-3354 [MEDIUM] CVE-2012-3354: dokuwiki - doku.php in DokuWiki, as used in Fedora 16, 17, and 18, when certain PHP error l... doku.php in DokuWiki, as used in Fedora 16, 17, and 18, when certain PHP error levels are set, allows remote attackers to obtain sensitive information via the prefix parameter, which reveals the installation path in an error message. Scope: local bookworm: resolved (fixed in 0.0.20130510a-1) bullseye: resolved (fixed in 0.0.20130510a-1) forky: resolved (fixed in 0.
debian