The rst parser (parser/text_rst.py) in MoinMoin 1.6.1 does not check the ACL of an included page, which allows attackers to read unauthorized include files via unknown vectors.
hg.moinmo.in/moin/1.6/rev/35ff7a9b1546
moinmo.in/SecurityFixes
osvdb.org/48877
github.com/moinwiki/moin
github.com/pypa/advisory-database/tree/main/vulns/moin/PYSEC-2009-11.yaml
nvd.nist.gov/vuln/detail/CVE-2008-6548
web.archive.org/web/20080523123729/hg.moinmo.in/moin/1.6/raw-file/1.6.2/docs/CHANGES
web.archive.org/web/20211206185024/hg.moinmo.in/moin/1.6/rev/35ff7a9b1546