Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61641: Vulnerability in Wikimedia Foundation MediaWiki

0
Low
VulnerabilityCVE-2025-61641cvecve-2025-61641
Published: Mon Feb 02 2026 (02/02/2026, 23:39:38 UTC)
Source: CVE Database V5
Vendor/Project: Wikimedia Foundation
Product: MediaWiki

Description

CVE-2025-61641 is a low-severity vulnerability affecting Wikimedia Foundation's MediaWiki software, specifically in the includes/api/ApiQueryAllPages. php file. It impacts versions before 1. 39. 14, 1. 43. 4, and 1. 44. 1. The vulnerability has a CVSS 4.

AI-Powered Analysis

AILast updated: 02/02/2026, 23:59:46 UTC

Technical Analysis

CVE-2025-61641 is a vulnerability identified in the Wikimedia Foundation's MediaWiki software, specifically within the program file includes/api/ApiQueryAllPages.php. This vulnerability affects all versions prior to 1.39.14, 1.43.4, and 1.44.1. The issue is characterized by a low CVSS 4.0 score of 1.7, reflecting a low-severity security flaw. The CVSS vector indicates that the vulnerability can be exploited remotely over the network (AV:N) without authentication (PR:N) or user interaction (UI:N). The attack complexity is low (AC:L), and the vulnerability results in a limited impact on availability (VA:L) with no impact on confidentiality or integrity. The vulnerability does not involve scope changes, privilege escalation, or security impact on confidentiality or integrity. No known exploits are currently reported in the wild, and no patches or exploit details are provided in the source information. The vulnerability likely allows an attacker to cause minor disruptions or limited denial of service via the API query mechanism but does not enable data leakage or system compromise. The affected component, ApiQueryAllPages.php, is responsible for querying all pages in a MediaWiki instance, suggesting the vulnerability might involve improper handling of API requests leading to resource exhaustion or minor service degradation.

Potential Impact

For European organizations using MediaWiki, this vulnerability presents a low risk but should not be ignored. MediaWiki is widely used in educational institutions, government agencies, and enterprises for collaborative documentation and knowledge management. Exploitation could lead to minor availability issues or limited denial of service, potentially disrupting access to critical internal or public wiki resources. While the impact on confidentiality and integrity is negligible, service interruptions could affect operational continuity, especially in organizations relying heavily on MediaWiki for information dissemination. Given the low severity and absence of known exploits, the immediate threat is minimal; however, unpatched systems remain vulnerable to potential future exploitation. European entities with public-facing MediaWiki installations may be more exposed to remote attacks. The impact is more operational than data-centric, but any downtime or degraded service can have reputational and productivity consequences.

Mitigation Recommendations

European organizations should prioritize updating MediaWiki installations to versions 1.39.14, 1.43.4, or 1.44.1 or later as soon as patches become available. Until patches are applied, administrators should monitor API usage patterns for unusual or excessive queries targeting the ApiQueryAllPages endpoint to detect potential exploitation attempts. Rate limiting or temporarily disabling the vulnerable API endpoint may reduce exposure in high-risk environments. Employing web application firewalls (WAFs) with rules to detect and block suspicious API requests can provide additional protection. Regularly auditing MediaWiki configurations and access controls will help minimize attack surfaces. Organizations should also maintain up-to-date backups to ensure rapid recovery in case of service disruption. Finally, subscribing to Wikimedia Foundation security advisories will ensure timely awareness of updates or emerging threats related to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
wikimedia-foundation
Date Reserved
2025-09-29T13:18:37.248Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69813705f9fa50a62f65ad9e

Added to database: 2/2/2026, 11:45:09 PM

Last enriched: 2/2/2026, 11:59:46 PM

Last updated: 2/3/2026, 3:46:57 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats