Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61643: Vulnerability in Wikimedia Foundation MediaWiki

0
Low
VulnerabilityCVE-2025-61643cvecve-2025-61643
Published: Mon Feb 02 2026 (02/02/2026, 23:33:50 UTC)
Source: CVE Database V5
Vendor/Project: Wikimedia Foundation
Product: MediaWiki

Description

CVE-2025-61643 is a low-severity vulnerability in the Wikimedia Foundation's MediaWiki software affecting versions prior to 1. 39. 14, 1. 43. 4, and 1. 44. 1. The issue is located in the RecentChangeRCFeedNotifier. php file, potentially impacting the recent changes feed functionality. The CVSS 4.

AI-Powered Analysis

AILast updated: 02/10/2026, 10:54:56 UTC

Technical Analysis

CVE-2025-61643 is a vulnerability identified in the MediaWiki software maintained by the Wikimedia Foundation, specifically within the includes/recentchanges/RecentChangeRCFeedNotifier.php file. MediaWiki versions prior to 1.39.14, 1.43.4, and 1.44.1 are affected. The vulnerability has a CVSS 4.0 score of 2.7, classifying it as low severity. The CVSS vector indicates that the vulnerability can be exploited remotely (AV:N) without authentication (PR:N) or user interaction (UI:N), but it only causes low impact on confidentiality (VC:L) and no impact on integrity or availability. The exact nature of the vulnerability is not detailed beyond its association with the recent changes feed notifier component, which suggests it may involve information disclosure or minor data leakage. No known exploits are currently reported in the wild, and no patches or exploit code links are provided in the source data, implying that the issue is either newly disclosed or not actively targeted. The vulnerability was reserved in late 2025 and published in early 2026, indicating recent discovery. Given the low CVSS score and lack of known exploitation, the threat is minimal but should be addressed to maintain software security hygiene.

Potential Impact

For European organizations, the impact of CVE-2025-61643 is limited due to its low severity score and minimal effect on core security properties. MediaWiki is widely used in public sector, educational institutions, and some private organizations for collaborative documentation and knowledge management. A vulnerability in the recent changes feed notifier could potentially expose limited information about recent edits or system activity, which might aid an attacker in reconnaissance but does not directly compromise sensitive data or system integrity. The lack of authentication or user interaction requirements lowers the barrier for exploitation, but the low impact on confidentiality and no impact on integrity or availability reduce the overall risk. Organizations relying heavily on MediaWiki for critical operations should still prioritize patching to prevent any potential escalation or chaining with other vulnerabilities. The absence of known exploits reduces immediate threat but does not eliminate future risk.

Mitigation Recommendations

European organizations should ensure that all MediaWiki instances are updated to versions 1.39.14, 1.43.4, 1.44.1, or later, as these contain fixes for CVE-2025-61643. Since no official patch links are provided, organizations should monitor the Wikimedia Foundation's official security advisories and repositories for updates. In the interim, restricting public access to the recent changes feed or implementing network-level controls to limit exposure of MediaWiki instances can reduce risk. Regularly auditing MediaWiki configurations and logs for unusual activity related to recent changes feeds is advisable. Employing web application firewalls (WAFs) with custom rules to detect anomalous requests targeting the RecentChangeRCFeedNotifier.php endpoint can provide additional protection. Finally, integrating MediaWiki updates into routine patch management cycles ensures timely remediation of this and future vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
wikimedia-foundation
Date Reserved
2025-09-29T13:18:37.248Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69813705f9fa50a62f65ada3

Added to database: 2/2/2026, 11:45:09 PM

Last enriched: 2/10/2026, 10:54:56 AM

Last updated: 3/20/2026, 10:40:57 AM

Views: 55

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses