<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://en.wiki4.bluespice.com/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Mglaser1</id>
	<title>BlueSpice Helpdesk - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://en.wiki4.bluespice.com/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Mglaser1"/>
	<link rel="alternate" type="text/html" href="https://en.wiki4.bluespice.com/wiki/Special:Contributions/Mglaser1"/>
	<updated>2026-04-07T07:55:48Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.39.17</generator>
	<entry>
		<id>https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2025-02&amp;diff=10636</id>
		<title>Security:Security Advisories/BSSA-2025-02</title>
		<link rel="alternate" type="text/html" href="https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2025-02&amp;diff=10636"/>
		<updated>2025-04-17T12:26:59Z</updated>

		<summary type="html">&lt;p&gt;Mglaser1: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Featurepage|featured=true|featuredesc=CVE-2025-32068, CVE-2025-32068: Security vulnerabilities in extension OAuth and ConfirmAccount|featurestart=04/17/2025}}&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
|Date&lt;br /&gt;
|2025-04-17&lt;br /&gt;
|-&lt;br /&gt;
|Severity&lt;br /&gt;
|reported 10.0, BlueSpice assessment: &#039;&#039;&#039;medium&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|Affected&lt;br /&gt;
|MediaWiki extension &#039;&#039;OAuth&#039;&#039;, &#039;&#039;ConfirmAccount&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|Fixed in&lt;br /&gt;
|fix not yet available; workaround available&lt;br /&gt;
|-&lt;br /&gt;
|CVE&lt;br /&gt;
|[https://www.cve.org/CVERecord?id=CVE-2025-32068 CVE-2025-32068], [https://www.cve.org/CVERecord?id=CVE-2025-32074 CVE-2025-32074]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Problem==&lt;br /&gt;
MediaWiki issued a [https://lists.wikimedia.org/hyperkitty/list/mediawiki-announce@lists.wikimedia.org/message/CIXFJVC57OFRBCCEIDRLZCLFGMYGEYTT/ security release] affecting core and several extensions. This is also included in a BSI security advisory [https://wid.cert-bund.de/portal/wid/securityadvisory?uuid=2ff14d3a-dbb7-4ae8-a0de-369ab22ba6e8 WID-SEC-2025-0790]&lt;br /&gt;
&lt;br /&gt;
BlueSpice is mostly not affected, with the notable exception of&lt;br /&gt;
* Extension:OAuth. This is shipped in all BlueSpice versions &amp;gt; 4.4&lt;br /&gt;
* Extension:ConfirmAccount. This is only shipped in BlueSpice cloud editions&lt;br /&gt;
&lt;br /&gt;
==Impact assessment==&lt;br /&gt;
&#039;&#039;&#039;Summary&#039;&#039;&#039;: BlueSpice 4.5.x is affected, but only in edge case usage. The CVE rating of 10.0 does not apply in the context of BlueSpice. We rate it a &#039;&#039;&#039;medium&#039;&#039;&#039; threat.&lt;br /&gt;
* Extension:OAuth. A consumer can get a new access token which remains valid and thus gain access. This is only the case if OAuth extension is actively in use and an access token has been granted and revoked afterwards.&lt;br /&gt;
* Extension:ConfirmAccount. It is possible to prepare interface messages to include malicious code. The attacker has to have interface-admin rights to change system messages which can then result in a XSS attack. For BlueSpice default, this is the case if you are in group sysop.&lt;br /&gt;
&lt;br /&gt;
== Solution ==&lt;br /&gt;
&lt;br /&gt;
Hallo Welt! is working on an updated release. &lt;br /&gt;
* We recommend updating to BlueSpice 4.5.5 (not yet published).&lt;br /&gt;
* If an update is not possible, customers can simply deactivate the OAuth extension.&lt;br /&gt;
&lt;br /&gt;
==Acknowledgements==&lt;br /&gt;
Reported by BSI.&lt;/div&gt;</summary>
		<author><name>Mglaser1</name></author>
	</entry>
	<entry>
		<id>https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2025-02&amp;diff=10635</id>
		<title>Security:Security Advisories/BSSA-2025-02</title>
		<link rel="alternate" type="text/html" href="https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2025-02&amp;diff=10635"/>
		<updated>2025-04-17T12:19:24Z</updated>

		<summary type="html">&lt;p&gt;Mglaser1: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Featurepage|featured=true|featuredesc=CVE-2025-32068, CVE-2025-32068: Security vulnerabilities in extension OAuth and ConfirmAccount|featurestart=04/17/2025}}&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
|Date&lt;br /&gt;
|2025-04-17&lt;br /&gt;
|-&lt;br /&gt;
|Severity&lt;br /&gt;
|reported 10.0&lt;br /&gt;
|-&lt;br /&gt;
|Affected&lt;br /&gt;
|MediaWiki extension &#039;&#039;OAuth&#039;&#039;, &#039;&#039;ConfirmAccount&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|Fixed in&lt;br /&gt;
|fix not yet available; workaround available&lt;br /&gt;
|-&lt;br /&gt;
|CVE&lt;br /&gt;
|[https://www.cve.org/CVERecord?id=CVE-2025-32068 CVE-2025-32068], [https://www.cve.org/CVERecord?id=CVE-2025-32074 CVE-2025-32074]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Problem==&lt;br /&gt;
MediaWiki issued a [https://lists.wikimedia.org/hyperkitty/list/mediawiki-announce@lists.wikimedia.org/message/CIXFJVC57OFRBCCEIDRLZCLFGMYGEYTT/ security release] affecting core and several extensions. This is also included in a BSI security advisory [https://wid.cert-bund.de/portal/wid/securityadvisory?uuid=2ff14d3a-dbb7-4ae8-a0de-369ab22ba6e8 WID-SEC-2025-0790]&lt;br /&gt;
&lt;br /&gt;
BlueSpice is mostly not affected, with the notable exception of&lt;br /&gt;
* Extension:OAuth. This is shipped in all BlueSpice versions &amp;gt; 4.4&lt;br /&gt;
* Extension:ConfirmAccount. This is only shipped in BlueSpice cloud editions&lt;br /&gt;
&lt;br /&gt;
==Impact assessment==&lt;br /&gt;
&lt;br /&gt;
* Extension:OAuth. A consumer can get a new access token which remains valid and thus gain access. This is only the case if OAuth extension is actively in use and an access token has been granted and revoked afterwards.&lt;br /&gt;
* Extension:ConfirmAccount. It is possible to prepare interface messages to include malicious code. The attacker has to have interface-admin rights to change system messages which can then result in a XSS attack. For BlueSpice default, this is the case if you are in group sysop.&lt;br /&gt;
&lt;br /&gt;
== Solution ==&lt;br /&gt;
&lt;br /&gt;
Hallo Welt! is working on an updated release. &lt;br /&gt;
* We recommend updating to BlueSpice 4.5.5 (not yet published).&lt;br /&gt;
* If an update is not possible, customers can simply deactivate the OAuth extension.&lt;br /&gt;
&lt;br /&gt;
==Acknowledgements==&lt;br /&gt;
Reported by BSI.&lt;/div&gt;</summary>
		<author><name>Mglaser1</name></author>
	</entry>
	<entry>
		<id>https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2025-02&amp;diff=10634</id>
		<title>Security:Security Advisories/BSSA-2025-02</title>
		<link rel="alternate" type="text/html" href="https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2025-02&amp;diff=10634"/>
		<updated>2025-04-17T11:57:42Z</updated>

		<summary type="html">&lt;p&gt;Mglaser1: Created page with &amp;quot;{{Featurepage|featured=true|featuredesc=CVE-2025-32068, CVE-2025-32068: Security vulnerabilities in extension OAuth and ConfirmAccount|featurestart=04/17/2025}} {| class=&amp;quot;wikitable&amp;quot; |+ ! ! |- |Date |2025-04-17 |- |Severity |reported 10.0 |- |Affected |MediaWiki extension &amp;#039;&amp;#039;OAuth&amp;#039;&amp;#039;, &amp;#039;&amp;#039;ConfirmAccount&amp;#039;&amp;#039; |- |Fixed in |BlueSpice 4.5.4 |- |CVE |[https://www.cve.org/CVERecord?id=CVE-2025-32068 CVE-2025-32068], [https://www.cve.org/CVERecord?id=CVE-2025-32074 CVE-2025-32074] |}...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Featurepage|featured=true|featuredesc=CVE-2025-32068, CVE-2025-32068: Security vulnerabilities in extension OAuth and ConfirmAccount|featurestart=04/17/2025}}&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
|Date&lt;br /&gt;
|2025-04-17&lt;br /&gt;
|-&lt;br /&gt;
|Severity&lt;br /&gt;
|reported 10.0&lt;br /&gt;
|-&lt;br /&gt;
|Affected&lt;br /&gt;
|MediaWiki extension &#039;&#039;OAuth&#039;&#039;, &#039;&#039;ConfirmAccount&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|Fixed in&lt;br /&gt;
|BlueSpice 4.5.4&lt;br /&gt;
|-&lt;br /&gt;
|CVE&lt;br /&gt;
|[https://www.cve.org/CVERecord?id=CVE-2025-32068 CVE-2025-32068], [https://www.cve.org/CVERecord?id=CVE-2025-32074 CVE-2025-32074]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Problem==&lt;br /&gt;
CVE-2025-23081 mentions several security issues with MediaWiki extensions &amp;lt; 1.39.11 . &lt;br /&gt;
&amp;lt;br /&amp;gt;&#039;&#039;&#039;BlueSpice only uses one of these extensions: DataTransfer.&#039;&#039;&#039;&lt;br /&gt;
* CVE-2025-23072: Concerns &#039;&#039;Extension:RefreshSpecial&#039;&#039; → not included in BlueSpice distribution → not affected&lt;br /&gt;
* CVE-2025-23073: Concerns &#039;&#039;Extension:GlobalBlocking&#039;&#039; → not included in BlueSpice distribution → not affected&lt;br /&gt;
* CVE-2025-23074: Concerns &#039;&#039;Extension:SocialProfile&#039;&#039; → not included in BlueSpice distribution → not affected&lt;br /&gt;
* CVE-2025-23078: Concerns &#039;&#039;Extension:Breadcrumbs2&#039;&#039; → not included in BlueSpice distribution → not affected&lt;br /&gt;
* CVE-2025-23079: Concerns &#039;&#039;Extension:ArticleFeedbackv5&#039;&#039; → not included in BlueSpice distribution → not affected&lt;br /&gt;
* CVE-2025-23080: Concerns &#039;&#039;Extension:OpenBadges&#039;&#039; → not included in BlueSpice distribution → not affected&lt;br /&gt;
* CVE-2025-23081: Concerns &#039;&#039;&#039;&#039;&#039;Extension:DataTransfer&#039;&#039;&#039;&#039;&#039; → &#039;&#039;&#039;Included in BlueSpice distribution&#039;&#039;&#039;  → &#039;&#039;&#039;affected&#039;&#039;&#039;&lt;br /&gt;
** → BlueSpice 4.5.3 is affected&lt;br /&gt;
** → BlueSpice 4.5.4 ist not affected&lt;br /&gt;
&lt;br /&gt;
==Impact assessment==&lt;br /&gt;
&lt;br /&gt;
* There is no official assessment by the author of the CVE. XSS and CSRF attacks in general allow identity theft and privilege escalation. This security vulnerability can only be exploited by users who are created in the wiki (including those who have been created and blocked).&lt;br /&gt;
&lt;br /&gt;
== Solution ==&lt;br /&gt;
&lt;br /&gt;
* We recommend updating to BlueSpice 4.5.4.&lt;br /&gt;
* If an update is not possible, customers can simply deactivate the DataTransfer extension.&lt;br /&gt;
&lt;br /&gt;
==Acknowledgements==&lt;br /&gt;
Reported by a customer.&lt;/div&gt;</summary>
		<author><name>Mglaser1</name></author>
	</entry>
	<entry>
		<id>https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories&amp;diff=10633</id>
		<title>Security:Security Advisories</title>
		<link rel="alternate" type="text/html" href="https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories&amp;diff=10633"/>
		<updated>2025-04-17T11:54:15Z</updated>

		<summary type="html">&lt;p&gt;Mglaser1: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;width:100%;&amp;quot;&lt;br /&gt;
!Release name&lt;br /&gt;
!Release date&lt;br /&gt;
!Title&lt;br /&gt;
!References&lt;br /&gt;
!Summary&lt;br /&gt;
|-&lt;br /&gt;
|[[Security:Security Advisories/BSSA-2025-02|BSSA-2025-02]]&lt;br /&gt;
|2025-04-17&lt;br /&gt;
|Security vulnerabilities in Extension:OAuth &lt;br /&gt;
|[https://www.cve.org/CVERecord?id=CVE-2025-32068 CVE-2025-32068], [https://www.cve.org/CVERecord?id=CVE-2025-32074 CVE-2025-32074]&lt;br /&gt;
|Allows unauthorized access to the wiki, Cross-Site Scripting (XSS)&lt;br /&gt;
|-&lt;br /&gt;
|[[Security:Security Advisories/BSSA-2025-01|BSSA-2025-01]]&lt;br /&gt;
|2025-01-20&lt;br /&gt;
|Security vulnerabilities in Extension:DataTransfer &lt;br /&gt;
|[https://www.cve.org/CVERecord?id=CVE-2025-23081 CVE-2025-23081]&lt;br /&gt;
|Allows Cross Site Request Forgery, Cross-Site Scripting (XSS)&lt;br /&gt;
|-&lt;br /&gt;
|[[Security:Security Advisories/BSSA-2023-01|BSSA-2023-01]]&lt;br /&gt;
|2023-07-25&lt;br /&gt;
|Ghostscript vulnerability&lt;br /&gt;
|[https://www.cve.org/CVERecord?id=CVE-2023-36664 CVE-2023-36664]&lt;br /&gt;
|Code can be executed on the server via a manipulated PDF&lt;br /&gt;
|-&lt;br /&gt;
|[[Security:Security Advisories/BSSA-2022-08|BSSA-2022-08]]&lt;br /&gt;
|2022-11-15&lt;br /&gt;
|XSS attack vector on regular pages&lt;br /&gt;
|[https://www.cve.org/CVERecord?id=CVE-2022-3895 CVE-2022-3895]&lt;br /&gt;
|Arbitrary HTML injection through use of interface elements&lt;br /&gt;
|-&lt;br /&gt;
|[[Security:Security Advisories/BSSA-2022-07|BSSA-2022-07]]&lt;br /&gt;
|2022-11-15&lt;br /&gt;
|XSS attack vector on regular pages&lt;br /&gt;
|[https://www.cve.org/CVERecord?id=CVE-2022-3958 CVE-2022-3958]&lt;br /&gt;
|Arbitrary HTML injection through personal menu items&lt;br /&gt;
|-&lt;br /&gt;
|[[Security:Security Advisories/BSSA-2022-06|BSSA-2022-06]]&lt;br /&gt;
|2022-11-15&lt;br /&gt;
|XSS attack vector on regular pages&lt;br /&gt;
|[https://www.cve.org/CVERecord?id=CVE-2022-3893 CVE-2022-3893]&lt;br /&gt;
|Arbitrary HTML injection through the custom menu&lt;br /&gt;
|-&lt;br /&gt;
|[[Security:Security Advisories/BSSA-2022-05|BSSA-2022-05]]&lt;br /&gt;
|2022-11-15&lt;br /&gt;
|XSS attack vector on regular pages&lt;br /&gt;
|[https://www.cve.org/CVERecord?id=CVE-2022-42001 CVE-2022-42001]&lt;br /&gt;
|Arbitrary HTML injection through the book navigation&lt;br /&gt;
|-&lt;br /&gt;
|[[Security:Security Advisories/BSSA-2022-04|BSSA-2022-04]]&lt;br /&gt;
|2022-11-15&lt;br /&gt;
|XSS attack vector on regular pages&lt;br /&gt;
|[https://www.cve.org/CVERecord?id=CVE-2022-41789 CVE-2022-41789], [https://www.cve.org/CVERecord?id=CVE-2022-41814 CVE-2022-41814], [https://www.cve.org/CVERecord?id=CVE-2022-42000 CVE-2022-42000]&lt;br /&gt;
|Arbitrary HTML injection through user preferences&lt;br /&gt;
|-&lt;br /&gt;
|[[Security:Security Advisories/BSSA-2022-03|BSSA-2022-03]]&lt;br /&gt;
|2022-11-15&lt;br /&gt;
|XSS attack vector on regular pages&lt;br /&gt;
|[https://www.cve.org/CVERecord?id=CVE-2022-41611 CVE-2022-41611]&lt;br /&gt;
|Arbitrary HTML injection through main navigation&lt;br /&gt;
|-&lt;br /&gt;
|[[Security:Security Advisories/BSSA-2022-02|BSSA-2022-02]]&lt;br /&gt;
|2022-11-15&lt;br /&gt;
|XSS attack vector on regular pages&lt;br /&gt;
|[https://www.cve.org/CVERecord?id=CVE-2022-2511 CVE-2022-2511]&lt;br /&gt;
|Arbitrary HTML injection through the &#039;title&#039; parameter&lt;br /&gt;
|-&lt;br /&gt;
|[[Security:Security Advisories/BSSA-2022-01|BSSA-2022-01]]&lt;br /&gt;
|2022-01-31&lt;br /&gt;
|XSS attack vector in Search Center&lt;br /&gt;
|[https://www.cve.org/CVERecord?id=CVE-2022-2510 CVE-2022-2510]&lt;br /&gt;
|JavaScript in search field is reflected back to the browser.&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Mglaser1</name></author>
	</entry>
	<entry>
		<id>https://en.wiki4.bluespice.com/w/index.php?title=User:Mglaser1&amp;diff=10632</id>
		<title>User:Mglaser1</title>
		<link rel="alternate" type="text/html" href="https://en.wiki4.bluespice.com/w/index.php?title=User:Mglaser1&amp;diff=10632"/>
		<updated>2025-04-17T11:51:28Z</updated>

		<summary type="html">&lt;p&gt;Mglaser1: create user page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Userpage standard content}}&lt;/div&gt;</summary>
		<author><name>Mglaser1</name></author>
	</entry>
</feed>