CVE-2025-32964: CWE-285: Improper Authorization in miraheze ManageWiki
ManageWiki is a MediaWiki extension allowing users to manage wikis. Prior to commit 00bebea, when enabling a conflicting extension, a restricted extension would be automatically disabled even if the user did not hold the ManageWiki-restricted right. This issue has been patched in commit 00bebea. A workaround involves ensuring that any extensions requiring specific permissions in `$wgManageWikiExtensions` also require the same permissions for managing any conflicting extensions.
AI Analysis
Technical Summary
CVE-2025-32964 is an improper authorization vulnerability (CWE-285) found in the ManageWiki extension for MediaWiki, developed by miraheze. ManageWiki facilitates the management of multiple wikis and their extensions. The vulnerability exists in versions prior to commit 00bebea, where enabling a conflicting extension could lead to an automatic disabling of a restricted extension without verifying if the user held the necessary ManageWiki-restricted rights. Essentially, users lacking proper authorization could indirectly affect the state of restricted extensions by enabling conflicting ones, bypassing intended permission checks. This flaw arises from insufficient enforcement of permission requirements when managing extensions that have conflicts, allowing unauthorized users to alter extension states that should be protected. The issue was addressed in commit 00bebea by ensuring that extensions listed in the $wgManageWikiExtensions configuration require consistent permission checks for managing conflicting extensions. No known exploits have been reported in the wild to date. The vulnerability impacts the integrity and potentially availability of wiki extensions by allowing unauthorized modification of extension states, which could disrupt wiki functionality or security controls. Exploitation does not require user interaction beyond the ability to enable extensions, but does require some level of access to the ManageWiki interface. The scope is limited to installations using ManageWiki with conflicting extensions configured. This vulnerability is categorized as medium severity due to its potential to bypass authorization controls but limited by the prerequisite access level and lack of direct remote exploitation vectors.
Potential Impact
For European organizations using MediaWiki with the ManageWiki extension, this vulnerability could lead to unauthorized changes in wiki extension configurations, potentially disrupting internal knowledge management systems or exposing sensitive information if restricted extensions are disabled improperly. Organizations relying on wikis for documentation, collaboration, or knowledge sharing could face integrity issues, where unauthorized users modify extension states, possibly leading to degraded wiki functionality or exposure of restricted content. While the vulnerability does not directly allow remote code execution or data exfiltration, the improper authorization could be leveraged as part of a broader attack chain, especially in environments where wiki access controls are critical. The impact is more pronounced in sectors with strict compliance requirements or where wikis contain sensitive operational or strategic information, such as government agencies, research institutions, and large enterprises prevalent in Europe. Disruption of wiki services could affect productivity and information reliability. However, the lack of known exploits and the requirement for some level of authenticated access reduce the immediate risk level.
Mitigation Recommendations
Upgrade ManageWiki to the version including commit 00bebea or later, which patches the improper authorization flaw. Review and audit the $wgManageWikiExtensions configuration to ensure that all extensions requiring specific permissions also enforce these permissions consistently when managing conflicting extensions. Implement strict access controls on who can enable or disable extensions within ManageWiki, limiting this capability to trusted administrators only. Monitor and log all extension management activities to detect unauthorized attempts to enable or disable extensions. Conduct regular permission reviews and penetration testing focused on wiki management interfaces to identify potential authorization bypasses. Educate administrators on the risks of enabling conflicting extensions and the importance of adhering to permission models within ManageWiki.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium
CVE-2025-32964: CWE-285: Improper Authorization in miraheze ManageWiki
Description
ManageWiki is a MediaWiki extension allowing users to manage wikis. Prior to commit 00bebea, when enabling a conflicting extension, a restricted extension would be automatically disabled even if the user did not hold the ManageWiki-restricted right. This issue has been patched in commit 00bebea. A workaround involves ensuring that any extensions requiring specific permissions in `$wgManageWikiExtensions` also require the same permissions for managing any conflicting extensions.
AI-Powered Analysis
Technical Analysis
CVE-2025-32964 is an improper authorization vulnerability (CWE-285) found in the ManageWiki extension for MediaWiki, developed by miraheze. ManageWiki facilitates the management of multiple wikis and their extensions. The vulnerability exists in versions prior to commit 00bebea, where enabling a conflicting extension could lead to an automatic disabling of a restricted extension without verifying if the user held the necessary ManageWiki-restricted rights. Essentially, users lacking proper authorization could indirectly affect the state of restricted extensions by enabling conflicting ones, bypassing intended permission checks. This flaw arises from insufficient enforcement of permission requirements when managing extensions that have conflicts, allowing unauthorized users to alter extension states that should be protected. The issue was addressed in commit 00bebea by ensuring that extensions listed in the $wgManageWikiExtensions configuration require consistent permission checks for managing conflicting extensions. No known exploits have been reported in the wild to date. The vulnerability impacts the integrity and potentially availability of wiki extensions by allowing unauthorized modification of extension states, which could disrupt wiki functionality or security controls. Exploitation does not require user interaction beyond the ability to enable extensions, but does require some level of access to the ManageWiki interface. The scope is limited to installations using ManageWiki with conflicting extensions configured. This vulnerability is categorized as medium severity due to its potential to bypass authorization controls but limited by the prerequisite access level and lack of direct remote exploitation vectors.
Potential Impact
For European organizations using MediaWiki with the ManageWiki extension, this vulnerability could lead to unauthorized changes in wiki extension configurations, potentially disrupting internal knowledge management systems or exposing sensitive information if restricted extensions are disabled improperly. Organizations relying on wikis for documentation, collaboration, or knowledge sharing could face integrity issues, where unauthorized users modify extension states, possibly leading to degraded wiki functionality or exposure of restricted content. While the vulnerability does not directly allow remote code execution or data exfiltration, the improper authorization could be leveraged as part of a broader attack chain, especially in environments where wiki access controls are critical. The impact is more pronounced in sectors with strict compliance requirements or where wikis contain sensitive operational or strategic information, such as government agencies, research institutions, and large enterprises prevalent in Europe. Disruption of wiki services could affect productivity and information reliability. However, the lack of known exploits and the requirement for some level of authenticated access reduce the immediate risk level.
Mitigation Recommendations
Upgrade ManageWiki to the version including commit 00bebea or later, which patches the improper authorization flaw. Review and audit the $wgManageWikiExtensions configuration to ensure that all extensions requiring specific permissions also enforce these permissions consistently when managing conflicting extensions. Implement strict access controls on who can enable or disable extensions within ManageWiki, limiting this capability to trusted administrators only. Monitor and log all extension management activities to detect unauthorized attempts to enable or disable extensions. Conduct regular permission reviews and penetration testing focused on wiki management interfaces to identify potential authorization bypasses. Educate administrators on the risks of enabling conflicting extensions and the importance of adhering to permission models within ManageWiki.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-04-14T21:47:11.453Z
- Cisa Enriched
- true
Threat ID: 682d9849c4522896dcbf683a
Added to database: 5/21/2025, 9:09:29 AM
Last enriched: 6/21/2025, 11:51:12 PM
Last updated: 1/7/2026, 4:23:16 AM
Views: 48
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20893: Origin validation error in Fujitsu Client Computing Limited Fujitsu Security Solution AuthConductor Client Basic V2
HighCVE-2025-14891: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ivole Customer Reviews for WooCommerce
MediumCVE-2025-14059: CWE-73 External Control of File Name or Path in roxnor EmailKit – Email Customizer for WooCommerce & WP
MediumCVE-2025-12648: CWE-552 Files or Directories Accessible to External Parties in cbutlerjr WP-Members Membership Plugin
MediumCVE-2025-14631: CWE-476 NULL Pointer Dereference in TP-Link Systems Inc. Archer BE400
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.