The rst parser (parser/text_rst.py) in MoinMoin 1.6.1 does not check the ACL of an included page, which allows attackers to read unauthorized include files via unknown vectors.
Threat-Mapped Scoring
Score: 0.0
Priority: Unclassified
EPSS
Score: 0.00228Percentile:
0.45605
CVSS Scoring
CVSS v2 Score: 5.0
Severity:
Mapped CWE(s)
CWE-862
: Missing Authorization
All CAPEC(s)
CAPEC-665 : Exploitation of Thunderbolt Protection Flaws
CAPEC(s) with Mapped TTPs
CAPEC-665 : Exploitation of Thunderbolt Protection Flaws
Mapped TTPs:
T1211
: Exploitation for Defense Evasion
T1542.002
: Component Firmware
T1556
: Modify Authentication Process
Mapped ATT&CK TTPs
T1211
: Exploitation for Defense Evasion
Kill Chain: defense-evasion
T1542.002
: Component Firmware
Kill Chain: persistence
T1556
: Modify Authentication Process
Kill Chain: credential-access
Malware
APTs Threat Group Associations
Campaigns
Affected Products
cpe:2.3:a:moinmo:moinmoin:1.6.1:*:*:*:*:*:*:*
← Back to Home
BrownCoat Threat Intelligence Platform | 2025 Steve Gray — You Can’t Take the Sky from Me