CVE-2025-53483: CWE-352 Cross-Site Request Forgery (CSRF) in Wikimedia Foundation Mediawiki - SecurePoll extension
ArchivePage.php, UnarchivePage.php, and VoterEligibilityPage#executeClear() do not validate request methods or CSRF tokens, allowing attackers to trigger sensitive actions if an admin visits a malicious site. This issue affects Mediawiki - SecurePoll extension: from 1.39.X before 1.39.13, from 1.42.X before 1.42.7, from 1.43.X before 1.43.2.
AI Analysis
Technical Summary
CVE-2025-53483 is a high-severity Cross-Site Request Forgery (CSRF) vulnerability affecting the SecurePoll extension of the Wikimedia Foundation's Mediawiki software. Specifically, the vulnerability exists in the handling of sensitive actions within the ArchivePage.php, UnarchivePage.php, and the executeClear() method of VoterEligibilityPage. These components fail to properly validate HTTP request methods and do not verify CSRF tokens, which are critical for preventing unauthorized state-changing requests. As a result, an attacker can craft a malicious website that, when visited by an administrator of a Mediawiki instance using the vulnerable SecurePoll extension versions (1.39.x before 1.39.13, 1.42.x before 1.42.7, and 1.43.x before 1.43.2), can trigger sensitive administrative actions without the administrator's consent. This could include archiving or unarchiving pages or clearing voter eligibility data, potentially disrupting poll integrity and administrative controls. The CVSS v3.1 base score of 8.8 reflects the vulnerability's network attack vector, low attack complexity, no privileges required, but requiring user interaction (admin visiting a malicious site), with high impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild, but the vulnerability's nature and impact make it a significant risk for affected deployments.
Potential Impact
For European organizations using Mediawiki with the SecurePoll extension, this vulnerability poses a substantial risk to the integrity and availability of polling and voting data managed through the platform. This is particularly critical for governmental, educational, and non-profit organizations that rely on Mediawiki for collaborative decision-making or public consultations. An attacker exploiting this vulnerability could manipulate poll outcomes, disrupt administrative workflows, or cause denial of service by altering or deleting critical poll data. The compromise of administrative functions could also lead to broader trust issues in the affected platforms, potentially impacting transparency and governance processes. Given the widespread use of Mediawiki in Europe, especially in public sector and academic institutions, the vulnerability could have cascading effects on democratic processes and organizational operations if left unmitigated.
Mitigation Recommendations
Organizations should immediately upgrade the SecurePoll extension to the fixed versions: 1.39.13 or later for the 1.39.x branch, 1.42.7 or later for the 1.42.x branch, and 1.43.2 or later for the 1.43.x branch. If immediate upgrading is not feasible, administrators should implement strict Content Security Policies (CSP) to limit the ability of malicious sites to execute unauthorized requests. Additionally, administrators should enforce the use of same-site cookies and ensure that HTTP request methods are validated server-side to reject unsafe methods for sensitive actions. Monitoring administrative access logs for unusual activity and educating administrators about the risks of visiting untrusted websites while logged into Mediawiki can reduce the risk of exploitation. Finally, applying web application firewalls (WAFs) with rules to detect and block CSRF attempts targeting the SecurePoll endpoints can provide an additional layer of defense.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Italy, Spain, Poland
CVE-2025-53483: CWE-352 Cross-Site Request Forgery (CSRF) in Wikimedia Foundation Mediawiki - SecurePoll extension
Description
ArchivePage.php, UnarchivePage.php, and VoterEligibilityPage#executeClear() do not validate request methods or CSRF tokens, allowing attackers to trigger sensitive actions if an admin visits a malicious site. This issue affects Mediawiki - SecurePoll extension: from 1.39.X before 1.39.13, from 1.42.X before 1.42.7, from 1.43.X before 1.43.2.
AI-Powered Analysis
Technical Analysis
CVE-2025-53483 is a high-severity Cross-Site Request Forgery (CSRF) vulnerability affecting the SecurePoll extension of the Wikimedia Foundation's Mediawiki software. Specifically, the vulnerability exists in the handling of sensitive actions within the ArchivePage.php, UnarchivePage.php, and the executeClear() method of VoterEligibilityPage. These components fail to properly validate HTTP request methods and do not verify CSRF tokens, which are critical for preventing unauthorized state-changing requests. As a result, an attacker can craft a malicious website that, when visited by an administrator of a Mediawiki instance using the vulnerable SecurePoll extension versions (1.39.x before 1.39.13, 1.42.x before 1.42.7, and 1.43.x before 1.43.2), can trigger sensitive administrative actions without the administrator's consent. This could include archiving or unarchiving pages or clearing voter eligibility data, potentially disrupting poll integrity and administrative controls. The CVSS v3.1 base score of 8.8 reflects the vulnerability's network attack vector, low attack complexity, no privileges required, but requiring user interaction (admin visiting a malicious site), with high impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild, but the vulnerability's nature and impact make it a significant risk for affected deployments.
Potential Impact
For European organizations using Mediawiki with the SecurePoll extension, this vulnerability poses a substantial risk to the integrity and availability of polling and voting data managed through the platform. This is particularly critical for governmental, educational, and non-profit organizations that rely on Mediawiki for collaborative decision-making or public consultations. An attacker exploiting this vulnerability could manipulate poll outcomes, disrupt administrative workflows, or cause denial of service by altering or deleting critical poll data. The compromise of administrative functions could also lead to broader trust issues in the affected platforms, potentially impacting transparency and governance processes. Given the widespread use of Mediawiki in Europe, especially in public sector and academic institutions, the vulnerability could have cascading effects on democratic processes and organizational operations if left unmitigated.
Mitigation Recommendations
Organizations should immediately upgrade the SecurePoll extension to the fixed versions: 1.39.13 or later for the 1.39.x branch, 1.42.7 or later for the 1.42.x branch, and 1.43.2 or later for the 1.43.x branch. If immediate upgrading is not feasible, administrators should implement strict Content Security Policies (CSP) to limit the ability of malicious sites to execute unauthorized requests. Additionally, administrators should enforce the use of same-site cookies and ensure that HTTP request methods are validated server-side to reject unsafe methods for sensitive actions. Monitoring administrative access logs for unusual activity and educating administrators about the risks of visiting untrusted websites while logged into Mediawiki can reduce the risk of exploitation. Finally, applying web application firewalls (WAFs) with rules to detect and block CSRF attempts targeting the SecurePoll endpoints can provide an additional layer of defense.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- wikimedia-foundation
- Date Reserved
- 2025-06-30T15:20:44.462Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 686811d36f40f0eb72a1e2c6
Added to database: 7/4/2025, 5:39:31 PM
Last enriched: 7/14/2025, 9:17:07 PM
Last updated: 8/17/2025, 8:40:49 PM
Views: 24
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.