Skip to main content

CVE-2025-53483: CWE-352 Cross-Site Request Forgery (CSRF) in Wikimedia Foundation Mediawiki - SecurePoll extension

High
VulnerabilityCVE-2025-53483cvecve-2025-53483cwe-352
Published: Fri Jul 04 2025 (07/04/2025, 17:28:40 UTC)
Source: CVE Database V5
Vendor/Project: Wikimedia Foundation
Product: Mediawiki - SecurePoll extension

Description

ArchivePage.php, UnarchivePage.php, and VoterEligibilityPage#executeClear() do not validate request methods or CSRF tokens, allowing attackers to trigger sensitive actions if an admin visits a malicious site. This issue affects Mediawiki - SecurePoll extension: from 1.39.X before 1.39.13, from 1.42.X before 1.42.7, from 1.43.X before 1.43.2.

AI-Powered Analysis

AILast updated: 07/14/2025, 21:17:07 UTC

Technical Analysis

CVE-2025-53483 is a high-severity Cross-Site Request Forgery (CSRF) vulnerability affecting the SecurePoll extension of the Wikimedia Foundation's Mediawiki software. Specifically, the vulnerability exists in the handling of sensitive actions within the ArchivePage.php, UnarchivePage.php, and the executeClear() method of VoterEligibilityPage. These components fail to properly validate HTTP request methods and do not verify CSRF tokens, which are critical for preventing unauthorized state-changing requests. As a result, an attacker can craft a malicious website that, when visited by an administrator of a Mediawiki instance using the vulnerable SecurePoll extension versions (1.39.x before 1.39.13, 1.42.x before 1.42.7, and 1.43.x before 1.43.2), can trigger sensitive administrative actions without the administrator's consent. This could include archiving or unarchiving pages or clearing voter eligibility data, potentially disrupting poll integrity and administrative controls. The CVSS v3.1 base score of 8.8 reflects the vulnerability's network attack vector, low attack complexity, no privileges required, but requiring user interaction (admin visiting a malicious site), with high impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild, but the vulnerability's nature and impact make it a significant risk for affected deployments.

Potential Impact

For European organizations using Mediawiki with the SecurePoll extension, this vulnerability poses a substantial risk to the integrity and availability of polling and voting data managed through the platform. This is particularly critical for governmental, educational, and non-profit organizations that rely on Mediawiki for collaborative decision-making or public consultations. An attacker exploiting this vulnerability could manipulate poll outcomes, disrupt administrative workflows, or cause denial of service by altering or deleting critical poll data. The compromise of administrative functions could also lead to broader trust issues in the affected platforms, potentially impacting transparency and governance processes. Given the widespread use of Mediawiki in Europe, especially in public sector and academic institutions, the vulnerability could have cascading effects on democratic processes and organizational operations if left unmitigated.

Mitigation Recommendations

Organizations should immediately upgrade the SecurePoll extension to the fixed versions: 1.39.13 or later for the 1.39.x branch, 1.42.7 or later for the 1.42.x branch, and 1.43.2 or later for the 1.43.x branch. If immediate upgrading is not feasible, administrators should implement strict Content Security Policies (CSP) to limit the ability of malicious sites to execute unauthorized requests. Additionally, administrators should enforce the use of same-site cookies and ensure that HTTP request methods are validated server-side to reject unsafe methods for sensitive actions. Monitoring administrative access logs for unusual activity and educating administrators about the risks of visiting untrusted websites while logged into Mediawiki can reduce the risk of exploitation. Finally, applying web application firewalls (WAFs) with rules to detect and block CSRF attempts targeting the SecurePoll endpoints can provide an additional layer of defense.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
wikimedia-foundation
Date Reserved
2025-06-30T15:20:44.462Z
Cvss Version
null
State
PUBLISHED

Threat ID: 686811d36f40f0eb72a1e2c6

Added to database: 7/4/2025, 5:39:31 PM

Last enriched: 7/14/2025, 9:17:07 PM

Last updated: 8/17/2025, 8:40:49 PM

Views: 24

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats