CVE-2025-32964: CWE-285: Improper Authorization in miraheze ManageWiki
ManageWiki is a MediaWiki extension allowing users to manage wikis. Prior to commit 00bebea, when enabling a conflicting extension, a restricted extension would be automatically disabled even if the user did not hold the ManageWiki-restricted right. This issue has been patched in commit 00bebea. A workaround involves ensuring that any extensions requiring specific permissions in `$wgManageWikiExtensions` also require the same permissions for managing any conflicting extensions.
AI Analysis
Technical Summary
CVE-2025-32964 is an improper authorization vulnerability (CWE-285) found in the ManageWiki extension for MediaWiki, developed by miraheze. ManageWiki facilitates the management of multiple wikis and their extensions. The vulnerability exists in versions prior to commit 00bebea, where enabling a conflicting extension could lead to an automatic disabling of a restricted extension without verifying if the user held the necessary ManageWiki-restricted rights. Essentially, users lacking proper authorization could indirectly affect the state of restricted extensions by enabling conflicting ones, bypassing intended permission checks. This flaw arises from insufficient enforcement of permission requirements when managing extensions that have conflicts, allowing unauthorized users to alter extension states that should be protected. The issue was addressed in commit 00bebea by ensuring that extensions listed in the $wgManageWikiExtensions configuration require consistent permission checks for managing conflicting extensions. No known exploits have been reported in the wild to date. The vulnerability impacts the integrity and potentially availability of wiki extensions by allowing unauthorized modification of extension states, which could disrupt wiki functionality or security controls. Exploitation does not require user interaction beyond the ability to enable extensions, but does require some level of access to the ManageWiki interface. The scope is limited to installations using ManageWiki with conflicting extensions configured. This vulnerability is categorized as medium severity due to its potential to bypass authorization controls but limited by the prerequisite access level and lack of direct remote exploitation vectors.
Potential Impact
For European organizations using MediaWiki with the ManageWiki extension, this vulnerability could lead to unauthorized changes in wiki extension configurations, potentially disrupting internal knowledge management systems or exposing sensitive information if restricted extensions are disabled improperly. Organizations relying on wikis for documentation, collaboration, or knowledge sharing could face integrity issues, where unauthorized users modify extension states, possibly leading to degraded wiki functionality or exposure of restricted content. While the vulnerability does not directly allow remote code execution or data exfiltration, the improper authorization could be leveraged as part of a broader attack chain, especially in environments where wiki access controls are critical. The impact is more pronounced in sectors with strict compliance requirements or where wikis contain sensitive operational or strategic information, such as government agencies, research institutions, and large enterprises prevalent in Europe. Disruption of wiki services could affect productivity and information reliability. However, the lack of known exploits and the requirement for some level of authenticated access reduce the immediate risk level.
Mitigation Recommendations
Upgrade ManageWiki to the version including commit 00bebea or later, which patches the improper authorization flaw. Review and audit the $wgManageWikiExtensions configuration to ensure that all extensions requiring specific permissions also enforce these permissions consistently when managing conflicting extensions. Implement strict access controls on who can enable or disable extensions within ManageWiki, limiting this capability to trusted administrators only. Monitor and log all extension management activities to detect unauthorized attempts to enable or disable extensions. Conduct regular permission reviews and penetration testing focused on wiki management interfaces to identify potential authorization bypasses. Educate administrators on the risks of enabling conflicting extensions and the importance of adhering to permission models within ManageWiki.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium
CVE-2025-32964: CWE-285: Improper Authorization in miraheze ManageWiki
Description
ManageWiki is a MediaWiki extension allowing users to manage wikis. Prior to commit 00bebea, when enabling a conflicting extension, a restricted extension would be automatically disabled even if the user did not hold the ManageWiki-restricted right. This issue has been patched in commit 00bebea. A workaround involves ensuring that any extensions requiring specific permissions in `$wgManageWikiExtensions` also require the same permissions for managing any conflicting extensions.
AI-Powered Analysis
Technical Analysis
CVE-2025-32964 is an improper authorization vulnerability (CWE-285) found in the ManageWiki extension for MediaWiki, developed by miraheze. ManageWiki facilitates the management of multiple wikis and their extensions. The vulnerability exists in versions prior to commit 00bebea, where enabling a conflicting extension could lead to an automatic disabling of a restricted extension without verifying if the user held the necessary ManageWiki-restricted rights. Essentially, users lacking proper authorization could indirectly affect the state of restricted extensions by enabling conflicting ones, bypassing intended permission checks. This flaw arises from insufficient enforcement of permission requirements when managing extensions that have conflicts, allowing unauthorized users to alter extension states that should be protected. The issue was addressed in commit 00bebea by ensuring that extensions listed in the $wgManageWikiExtensions configuration require consistent permission checks for managing conflicting extensions. No known exploits have been reported in the wild to date. The vulnerability impacts the integrity and potentially availability of wiki extensions by allowing unauthorized modification of extension states, which could disrupt wiki functionality or security controls. Exploitation does not require user interaction beyond the ability to enable extensions, but does require some level of access to the ManageWiki interface. The scope is limited to installations using ManageWiki with conflicting extensions configured. This vulnerability is categorized as medium severity due to its potential to bypass authorization controls but limited by the prerequisite access level and lack of direct remote exploitation vectors.
Potential Impact
For European organizations using MediaWiki with the ManageWiki extension, this vulnerability could lead to unauthorized changes in wiki extension configurations, potentially disrupting internal knowledge management systems or exposing sensitive information if restricted extensions are disabled improperly. Organizations relying on wikis for documentation, collaboration, or knowledge sharing could face integrity issues, where unauthorized users modify extension states, possibly leading to degraded wiki functionality or exposure of restricted content. While the vulnerability does not directly allow remote code execution or data exfiltration, the improper authorization could be leveraged as part of a broader attack chain, especially in environments where wiki access controls are critical. The impact is more pronounced in sectors with strict compliance requirements or where wikis contain sensitive operational or strategic information, such as government agencies, research institutions, and large enterprises prevalent in Europe. Disruption of wiki services could affect productivity and information reliability. However, the lack of known exploits and the requirement for some level of authenticated access reduce the immediate risk level.
Mitigation Recommendations
Upgrade ManageWiki to the version including commit 00bebea or later, which patches the improper authorization flaw. Review and audit the $wgManageWikiExtensions configuration to ensure that all extensions requiring specific permissions also enforce these permissions consistently when managing conflicting extensions. Implement strict access controls on who can enable or disable extensions within ManageWiki, limiting this capability to trusted administrators only. Monitor and log all extension management activities to detect unauthorized attempts to enable or disable extensions. Conduct regular permission reviews and penetration testing focused on wiki management interfaces to identify potential authorization bypasses. Educate administrators on the risks of enabling conflicting extensions and the importance of adhering to permission models within ManageWiki.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-04-14T21:47:11.453Z
- Cisa Enriched
- true
Threat ID: 682d9849c4522896dcbf683a
Added to database: 5/21/2025, 9:09:29 AM
Last enriched: 6/21/2025, 11:51:12 PM
Last updated: 8/11/2025, 9:58:08 PM
Views: 20
Related Threats
CVE-2025-8927: Improper Restriction of Excessive Authentication Attempts in mtons mblog
MediumCVE-2025-43988: n/a
CriticalCVE-2025-8926: SQL Injection in SourceCodester COVID 19 Testing Management System
MediumCVE-2025-43986: n/a
CriticalCVE-2025-43982: n/a
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.