CVE-2025-61641: Vulnerability in Wikimedia Foundation MediaWiki
CVE-2025-61641 is a low-severity vulnerability affecting Wikimedia Foundation's MediaWiki software, specifically in the includes/api/ApiQueryAllPages. php file. It impacts versions before 1. 39. 14, 1. 43. 4, and 1. 44. 1. The vulnerability has a CVSS 4.
AI Analysis
Technical Summary
CVE-2025-61641 is a vulnerability identified in the Wikimedia Foundation's MediaWiki software, specifically within the program file includes/api/ApiQueryAllPages.php. This vulnerability affects all versions prior to 1.39.14, 1.43.4, and 1.44.1. The issue is characterized by a low CVSS 4.0 score of 1.7, reflecting a low-severity security flaw. The CVSS vector indicates that the vulnerability can be exploited remotely over the network (AV:N) without authentication (PR:N) or user interaction (UI:N). The attack complexity is low (AC:L), and the vulnerability results in a limited impact on availability (VA:L) with no impact on confidentiality or integrity. The vulnerability does not involve scope changes, privilege escalation, or security impact on confidentiality or integrity. No known exploits are currently reported in the wild, and no patches or exploit details are provided in the source information. The vulnerability likely allows an attacker to cause minor disruptions or limited denial of service via the API query mechanism but does not enable data leakage or system compromise. The affected component, ApiQueryAllPages.php, is responsible for querying all pages in a MediaWiki instance, suggesting the vulnerability might involve improper handling of API requests leading to resource exhaustion or minor service degradation.
Potential Impact
For European organizations using MediaWiki, this vulnerability presents a low risk but should not be ignored. MediaWiki is widely used in educational institutions, government agencies, and enterprises for collaborative documentation and knowledge management. Exploitation could lead to minor availability issues or limited denial of service, potentially disrupting access to critical internal or public wiki resources. While the impact on confidentiality and integrity is negligible, service interruptions could affect operational continuity, especially in organizations relying heavily on MediaWiki for information dissemination. Given the low severity and absence of known exploits, the immediate threat is minimal; however, unpatched systems remain vulnerable to potential future exploitation. European entities with public-facing MediaWiki installations may be more exposed to remote attacks. The impact is more operational than data-centric, but any downtime or degraded service can have reputational and productivity consequences.
Mitigation Recommendations
European organizations should prioritize updating MediaWiki installations to versions 1.39.14, 1.43.4, or 1.44.1 or later as soon as patches become available. Until patches are applied, administrators should monitor API usage patterns for unusual or excessive queries targeting the ApiQueryAllPages endpoint to detect potential exploitation attempts. Rate limiting or temporarily disabling the vulnerable API endpoint may reduce exposure in high-risk environments. Employing web application firewalls (WAFs) with rules to detect and block suspicious API requests can provide additional protection. Regularly auditing MediaWiki configurations and access controls will help minimize attack surfaces. Organizations should also maintain up-to-date backups to ensure rapid recovery in case of service disruption. Finally, subscribing to Wikimedia Foundation security advisories will ensure timely awareness of updates or emerging threats related to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-61641: Vulnerability in Wikimedia Foundation MediaWiki
Description
CVE-2025-61641 is a low-severity vulnerability affecting Wikimedia Foundation's MediaWiki software, specifically in the includes/api/ApiQueryAllPages. php file. It impacts versions before 1. 39. 14, 1. 43. 4, and 1. 44. 1. The vulnerability has a CVSS 4.
AI-Powered Analysis
Technical Analysis
CVE-2025-61641 is a vulnerability identified in the Wikimedia Foundation's MediaWiki software, specifically within the program file includes/api/ApiQueryAllPages.php. This vulnerability affects all versions prior to 1.39.14, 1.43.4, and 1.44.1. The issue is characterized by a low CVSS 4.0 score of 1.7, reflecting a low-severity security flaw. The CVSS vector indicates that the vulnerability can be exploited remotely over the network (AV:N) without authentication (PR:N) or user interaction (UI:N). The attack complexity is low (AC:L), and the vulnerability results in a limited impact on availability (VA:L) with no impact on confidentiality or integrity. The vulnerability does not involve scope changes, privilege escalation, or security impact on confidentiality or integrity. No known exploits are currently reported in the wild, and no patches or exploit details are provided in the source information. The vulnerability likely allows an attacker to cause minor disruptions or limited denial of service via the API query mechanism but does not enable data leakage or system compromise. The affected component, ApiQueryAllPages.php, is responsible for querying all pages in a MediaWiki instance, suggesting the vulnerability might involve improper handling of API requests leading to resource exhaustion or minor service degradation.
Potential Impact
For European organizations using MediaWiki, this vulnerability presents a low risk but should not be ignored. MediaWiki is widely used in educational institutions, government agencies, and enterprises for collaborative documentation and knowledge management. Exploitation could lead to minor availability issues or limited denial of service, potentially disrupting access to critical internal or public wiki resources. While the impact on confidentiality and integrity is negligible, service interruptions could affect operational continuity, especially in organizations relying heavily on MediaWiki for information dissemination. Given the low severity and absence of known exploits, the immediate threat is minimal; however, unpatched systems remain vulnerable to potential future exploitation. European entities with public-facing MediaWiki installations may be more exposed to remote attacks. The impact is more operational than data-centric, but any downtime or degraded service can have reputational and productivity consequences.
Mitigation Recommendations
European organizations should prioritize updating MediaWiki installations to versions 1.39.14, 1.43.4, or 1.44.1 or later as soon as patches become available. Until patches are applied, administrators should monitor API usage patterns for unusual or excessive queries targeting the ApiQueryAllPages endpoint to detect potential exploitation attempts. Rate limiting or temporarily disabling the vulnerable API endpoint may reduce exposure in high-risk environments. Employing web application firewalls (WAFs) with rules to detect and block suspicious API requests can provide additional protection. Regularly auditing MediaWiki configurations and access controls will help minimize attack surfaces. Organizations should also maintain up-to-date backups to ensure rapid recovery in case of service disruption. Finally, subscribing to Wikimedia Foundation security advisories will ensure timely awareness of updates or emerging threats related to this vulnerability.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- wikimedia-foundation
- Date Reserved
- 2025-09-29T13:18:37.248Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69813705f9fa50a62f65ad9e
Added to database: 2/2/2026, 11:45:09 PM
Last enriched: 2/2/2026, 11:59:46 PM
Last updated: 2/3/2026, 3:46:57 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-67482: Vulnerability in Wikimedia Foundation Scribunto
LowCVE-2025-58383: CWE-250: Execution with Unnecessary Privileges in Brocade Fabric OS
HighCVE-2025-58382: CWE-305: Authentication Bypass by Primary Weakness in Brocade Fabric OS
HighCVE-2025-58379: CWE-250 Execution with Unnecessary Privileges in Brocade Fabric OS
MediumCVE-2025-12774: CWE-312 Cleartext Storage of Sensitive Information in Brocade SANnav
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.