Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61639: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Wikimedia Foundation MediaWiki

0
Low
VulnerabilityCVE-2025-61639cvecve-2025-61639cwe-200
Published: Mon Feb 02 2026 (02/02/2026, 23:48:02 UTC)
Source: CVE Database V5
Vendor/Project: Wikimedia Foundation
Product: MediaWiki

Description

CVE-2025-61639 is a low-severity vulnerability in Wikimedia Foundation's MediaWiki software that causes exposure of sensitive information to unauthorized actors. It affects multiple program files related to logging and recent changes in MediaWiki versions prior to 1. 39. 14, 1. 43. 4, and 1. 44. 1. The vulnerability allows an unauthenticated attacker to access sensitive data without user interaction. Although the CVSS score is low (1.

AI-Powered Analysis

AILast updated: 02/10/2026, 10:54:31 UTC

Technical Analysis

CVE-2025-61639 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) affecting Wikimedia Foundation's MediaWiki software. The flaw exists in several core MediaWiki program files responsible for logging and tracking recent changes: includes/logging/ManualLogEntry.Php, includes/recentchanges/RecentChangeFactory.Php, and includes/recentchanges/RecentChangeStore.Php. The vulnerability impacts all versions before 1.39.14, 1.43.4, and 1.44.1, allowing unauthorized actors to access sensitive information without requiring authentication or user interaction. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and low impact on confidentiality (VC:L), with no impact on integrity or availability. This suggests that an attacker can remotely exploit the vulnerability to gain limited sensitive information disclosure. Although no exploits are currently known in the wild, the exposure of sensitive logging and recent change data could facilitate reconnaissance or further attacks. The vulnerability is present in widely deployed versions of MediaWiki, which is commonly used by governments, educational institutions, and enterprises for collaborative content management. The absence of patches linked in the provided data indicates the need for organizations to update to the fixed versions promptly once available.

Potential Impact

For European organizations, the primary impact of CVE-2025-61639 is the unauthorized disclosure of sensitive information stored or processed by MediaWiki installations. This could include internal documentation, user activity logs, or change histories that may reveal operational details or confidential data. Such exposure can aid attackers in mapping organizational structures, identifying privileged users, or uncovering other vulnerabilities. While the direct impact on confidentiality is low, the information leakage could be leveraged in targeted attacks or social engineering campaigns. Organizations relying on MediaWiki for sensitive or internal content, especially in public sector, research, or educational environments, are at higher risk. The vulnerability does not affect system integrity or availability, so service disruption is unlikely. However, failure to address this issue could undermine trust and compliance with data protection regulations such as GDPR if personal or sensitive data is exposed. The lack of known exploits reduces immediate risk, but proactive mitigation is advisable to prevent exploitation as threat actors develop attack techniques.

Mitigation Recommendations

European organizations should take the following specific steps to mitigate CVE-2025-61639: 1) Identify all MediaWiki instances in their environment and verify the version numbers. 2) Prioritize upgrading MediaWiki installations to versions 1.39.14, 1.43.4, or 1.44.1 or later, where the vulnerability is fixed. 3) If immediate patching is not feasible, restrict network access to MediaWiki servers by implementing IP whitelisting or VPN-only access to limit exposure to unauthorized users. 4) Review and harden MediaWiki configuration settings to minimize sensitive data exposure in logs and recent changes, including disabling unnecessary logging features or restricting log visibility. 5) Monitor MediaWiki access logs for unusual or unauthorized access attempts that could indicate exploitation attempts. 6) Educate administrators and users about the importance of timely patching and secure configuration management. 7) Implement web application firewalls (WAFs) with rules to detect and block suspicious requests targeting MediaWiki logging and recent change endpoints. 8) Regularly audit MediaWiki content and logs for sensitive information that should not be publicly accessible. These targeted actions go beyond generic advice by focusing on MediaWiki-specific controls and operational practices.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
wikimedia-foundation
Date Reserved
2025-09-29T13:18:37.248Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69813a88f9fa50a62f66a5e2

Added to database: 2/3/2026, 12:00:08 AM

Last enriched: 2/10/2026, 10:54:31 AM

Last updated: 3/19/2026, 6:45:16 PM

Views: 91

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses