Skip to main content

CVE-2025-53483: CWE-352 Cross-Site Request Forgery (CSRF) in Wikimedia Foundation Mediawiki - SecurePoll extension

High
VulnerabilityCVE-2025-53483cvecve-2025-53483cwe-352
Published: Fri Jul 04 2025 (07/04/2025, 17:28:40 UTC)
Source: CVE Database V5
Vendor/Project: Wikimedia Foundation
Product: Mediawiki - SecurePoll extension

Description

ArchivePage.php, UnarchivePage.php, and VoterEligibilityPage#executeClear() do not validate request methods or CSRF tokens, allowing attackers to trigger sensitive actions if an admin visits a malicious site. This issue affects Mediawiki - SecurePoll extension: from 1.39.X before 1.39.13, from 1.42.X before 1.42.7, from 1.43.X before 1.43.2.

AI-Powered Analysis

AILast updated: 07/04/2025, 17:54:35 UTC

Technical Analysis

CVE-2025-53483 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the SecurePoll extension of the Wikimedia Foundation's Mediawiki software. This vulnerability affects versions 1.39.x prior to 1.39.13, 1.42.x prior to 1.42.7, and 1.43.x prior to 1.43.2. The issue arises because key scripts—ArchivePage.php, UnarchivePage.php, and the executeClear() method in VoterEligibilityPage—do not properly validate HTTP request methods or verify CSRF tokens. As a result, an attacker can craft malicious web pages that, when visited by an authenticated administrator of a Mediawiki instance using the vulnerable SecurePoll extension, can trigger sensitive administrative actions without the administrator’s consent or knowledge. These actions could include archiving or unarchiving pages or clearing voter eligibility data, potentially disrupting the integrity and availability of polling data managed through the extension. Since the vulnerability requires the victim to be an authenticated admin and involves social engineering to lure them to a malicious site, exploitation complexity is moderate. However, the lack of CSRF protections on critical administrative functions significantly increases the risk of unauthorized state changes within the affected Mediawiki installations. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations that deploy Mediawiki with the SecurePoll extension—commonly used for collaborative knowledge management and decision-making processes—this vulnerability poses a risk to the integrity and availability of polling and voting data. Successful exploitation could allow attackers to manipulate poll results, archive or unarchive pages arbitrarily, or clear voter eligibility records, undermining trust in organizational decision-making processes. This could be particularly damaging for public sector entities, academic institutions, and NGOs that rely on Mediawiki for transparent governance or collaborative work. Additionally, if exploited, the vulnerability could lead to reputational damage, operational disruption, and potential data integrity issues. Given that the attack requires an administrator to visit a malicious site, the threat also highlights the importance of secure browsing practices among privileged users. The confidentiality impact is limited since the vulnerability does not directly expose sensitive data, but integrity and availability impacts are significant.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately upgrade the SecurePoll extension to the fixed versions: 1.39.13 or later for the 1.39.x branch, 1.42.7 or later for the 1.42.x branch, and 1.43.2 or later for the 1.43.x branch. If immediate upgrading is not feasible, organizations should implement strict Content Security Policies (CSP) to restrict the domains from which scripts and forms can be loaded, reducing the risk of CSRF attacks. Additionally, administrators should be trained to avoid visiting untrusted websites while logged into Mediawiki admin accounts. Implementing multi-factor authentication (MFA) for admin accounts can also reduce the risk of account compromise. Network-level controls such as web application firewalls (WAFs) can be configured to detect and block suspicious requests that do not originate from legitimate user interactions. Finally, organizations should audit their Mediawiki logs for unusual administrative actions and monitor for any signs of exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
wikimedia-foundation
Date Reserved
2025-06-30T15:20:44.462Z
Cvss Version
null
State
PUBLISHED

Threat ID: 686811d36f40f0eb72a1e2c6

Added to database: 7/4/2025, 5:39:31 PM

Last enriched: 7/4/2025, 5:54:35 PM

Last updated: 7/4/2025, 5:54:35 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats