DEBIAN-CVE-2019-25338

Source
https://security-tracker.debian.org/tracker/CVE-2019-25338
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2019-25338.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2019-25338
Upstream
Published
2026-02-12T23:16:07.670Z
Modified
2026-02-27T11:00:59.796838Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
[none]
Details

DokuWiki 2018-04-22b contains a username enumeration vulnerability in its password reset functionality that allows attackers to identify valid user accounts. Attackers can submit different usernames to the password reset endpoint and distinguish between existing and non-existing accounts by analyzing the server's error response messages.

References

Affected packages

Debian:11 / dokuwiki

Package

Name
dokuwiki
Purl
pkg:deb/debian/dokuwiki?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.0.20180422.a-2.1
0.0.20200729-0.1~bpo11+1
0.0.20200729-0.1
0.0.20220317~gitaeff85c-0.1~exp1
0.0.20220731.a-1
0.0.20220731.a-2
0.0.20220731.a-3
Other
2024-02-06b-0exp1
2024-02-06b-0exp2
2024-02-06b-0exp3
2024-02-06b-0exp4
2024-02-06b+dfsg-0exp1
2024-02-06b+dfsg-0exp2
2024-02-06b+dfsg-1
2024-02-06b+dfsg-2
2024-02-06b+dfsg-3
2024-02-06b+dfsg-4
2024-02-06b+dfsg-5
2024-02-06b+dfsg-6
2024-02-06b+dfsg-7
2024-02-06b+dfsg-8
2024-02-06b+dfsg-9
2025-05-14+dfsg-1
2025-05-14.*
2025-05-14.a+dfsg-1
2025-05-14.a+dfsg-2
2025-05-14.a+dfsg-3
2025-05-14.a+dfsg-4
2025-05-14.b+dfsg-1
2025-05-14.b+dfsg-2
2025-05-14.b+dfsg-3
2025-05-14.b+dfsg-4
2025-05-14.b+dfsg-5

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2019-25338.json"

Debian:12 / dokuwiki

Package

Name
dokuwiki
Purl
pkg:deb/debian/dokuwiki?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.0.20220731.a-2
0.0.20220731.a-3
Other
2024-02-06b-0exp1
2024-02-06b-0exp2
2024-02-06b-0exp3
2024-02-06b-0exp4
2024-02-06b+dfsg-0exp1
2024-02-06b+dfsg-0exp2
2024-02-06b+dfsg-1
2024-02-06b+dfsg-2
2024-02-06b+dfsg-3
2024-02-06b+dfsg-4
2024-02-06b+dfsg-5
2024-02-06b+dfsg-6
2024-02-06b+dfsg-7
2024-02-06b+dfsg-8
2024-02-06b+dfsg-9
2025-05-14+dfsg-1
2025-05-14.*
2025-05-14.a+dfsg-1
2025-05-14.a+dfsg-2
2025-05-14.a+dfsg-3
2025-05-14.a+dfsg-4
2025-05-14.b+dfsg-1
2025-05-14.b+dfsg-2
2025-05-14.b+dfsg-3
2025-05-14.b+dfsg-4
2025-05-14.b+dfsg-5

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2019-25338.json"

Debian:13 / dokuwiki

Package

Name
dokuwiki
Purl
pkg:deb/debian/dokuwiki?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

Other
2024-02-06b+dfsg-9
2025-05-14+dfsg-1
2025-05-14.*
2025-05-14.a+dfsg-1
2025-05-14.a+dfsg-2
2025-05-14.a+dfsg-3
2025-05-14.a+dfsg-4
2025-05-14.b+dfsg-1
2025-05-14.b+dfsg-2
2025-05-14.b+dfsg-3
2025-05-14.b+dfsg-4
2025-05-14.b+dfsg-5

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2019-25338.json"

Debian:14 / dokuwiki

Package

Name
dokuwiki
Purl
pkg:deb/debian/dokuwiki?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

Other
2024-02-06b+dfsg-9
2025-05-14+dfsg-1
2025-05-14.*
2025-05-14.a+dfsg-1
2025-05-14.a+dfsg-2
2025-05-14.a+dfsg-3
2025-05-14.a+dfsg-4
2025-05-14.b+dfsg-1
2025-05-14.b+dfsg-2
2025-05-14.b+dfsg-3
2025-05-14.b+dfsg-4
2025-05-14.b+dfsg-5

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2019-25338.json"