Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-32698: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Wikimedia Foundation MediaWiki

0
Low
VulnerabilityCVE-2025-32698cvecve-2025-32698cwe-200
Published: Thu Apr 10 2025 (04/10/2025, 18:29:52 UTC)
Source: CVE Database V5
Vendor/Project: Wikimedia Foundation
Product: MediaWiki

Description

Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Wikimedia Foundation MediaWiki. This vulnerability is associated with program files includes/logging/LogPager.Php. This issue affects MediaWiki: before 1.39.12, 1.42.6, 1.43.1.

AI-Powered Analysis

AILast updated: 11/03/2025, 20:17:02 UTC

Technical Analysis

CVE-2025-32698 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) affecting the MediaWiki software maintained by the Wikimedia Foundation. The issue resides in the includes/logging/LogPager.php component, which is responsible for handling log data pagination and display. Versions prior to 1.39.12, 1.42.6, and 1.43.1 are vulnerable. The vulnerability allows an attacker who can send network requests and induce user interaction to access sensitive information that should otherwise be restricted. The CVSS 4.0 base score is 2.1, indicating low severity, with the vector showing network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but user interaction is needed (UI:A). The impact is limited to confidentiality (VC:L), with no impact on integrity or availability. No known exploits have been reported in the wild, and no patches were linked in the provided data, but the affected versions suggest that fixed releases are available. The vulnerability does not require authentication, but user interaction is necessary, which reduces the likelihood of exploitation. The exposure of sensitive information could include log details or metadata that might aid attackers in reconnaissance or social engineering. However, the limited scope and low impact reduce the overall risk. Organizations running MediaWiki instances, especially those exposing logs or administrative interfaces, should prioritize upgrading to the fixed versions to eliminate this information leakage vector.

Potential Impact

For European organizations, the primary impact of CVE-2025-32698 is the potential unauthorized disclosure of sensitive information contained within MediaWiki logs or related components. This could lead to minor confidentiality breaches, potentially exposing internal operational details or user activity logs. While the vulnerability does not affect data integrity or system availability, the leaked information could be leveraged by attackers for further targeted attacks, social engineering, or reconnaissance. Organizations that use MediaWiki for internal documentation, knowledge bases, or public-facing wikis containing sensitive or proprietary information are at higher risk. The low severity and requirement for user interaction limit the threat, but in sectors such as government, education, and research—where MediaWiki is commonly deployed—any information leakage can have reputational or compliance implications. Additionally, organizations subject to GDPR must consider the exposure of personal data and ensure timely remediation to avoid regulatory penalties.

Mitigation Recommendations

1. Upgrade MediaWiki instances to versions 1.39.12, 1.42.6, 1.43.1 or later, as these contain fixes for the vulnerability. 2. Review and restrict access to the includes/logging/LogPager.php and related log viewing functionalities, ensuring only authorized users can access sensitive logs. 3. Implement strict network segmentation and firewall rules to limit external access to MediaWiki administrative and logging interfaces. 4. Monitor user activity and logs for unusual access patterns that may indicate attempts to exploit this vulnerability. 5. Educate users about the risks of interacting with unsolicited links or requests that could trigger the vulnerability. 6. Regularly audit MediaWiki configurations and installed extensions to minimize exposure of sensitive information. 7. If immediate patching is not feasible, consider disabling or restricting logging features that expose sensitive data until an update can be applied.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
wikimedia-foundation
Date Reserved
2025-04-09T12:54:49.385Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 690909fb7fff0e30cee434ca

Added to database: 11/3/2025, 8:00:59 PM

Last enriched: 11/3/2025, 8:17:02 PM

Last updated: 11/4/2025, 7:06:24 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats