Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61647: Vulnerability in Wikimedia Foundation CheckUser

0
Low
VulnerabilityCVE-2025-61647cvecve-2025-61647
Published: Tue Feb 03 2026 (02/03/2026, 00:02:04 UTC)
Source: CVE Database V5
Vendor/Project: Wikimedia Foundation
Product: CheckUser

Description

Vulnerability in Wikimedia Foundation CheckUser. This vulnerability is associated with program files src/Api/Rest/Handler/UserInfoHandler.Php. This issue affects CheckUser: from a3dc1bbcc33acbcca6831d6afaccbb1054c93a57, 0584eb2ad564648aa3ce9c555dd044dda02b55f4.

AI-Powered Analysis

AILast updated: 03/03/2026, 18:29:01 UTC

Technical Analysis

CVE-2025-61647 is a vulnerability found in the Wikimedia Foundation's CheckUser extension, specifically within the source file src/Api/Rest/Handler/UserInfoHandler.php. The issue is categorized as CWE-22, which corresponds to a directory traversal vulnerability. This type of vulnerability allows an attacker to manipulate file paths to access files and directories outside the intended scope, potentially exposing sensitive data or system files. The affected versions are identified by specific commit hashes (a3dc1bbcc33acbcca6831d6afaccbb1054c93a57 and 0584eb2ad564648aa3ce9c555dd044dda02b55f4), indicating that the vulnerability exists in certain code revisions of the CheckUser extension. The CVSS 4.0 base score is 0.3, reflecting a low severity level. The vector indicates network attack vector (AV:N), low attack complexity (AC:L), partial authentication required (PR:L), user interaction required (UI:A), and low impact on confidentiality (VC:L), with no impact on integrity or availability. The vulnerability does not affect scope or security requirements. No known exploits have been reported in the wild, and no official patches have been linked at the time of publication. The CheckUser extension is used by Wikimedia projects to provide enhanced user information for administrators, so the vulnerability could potentially expose some user-related data if exploited. However, the low impact and required conditions limit the threat's severity.

Potential Impact

The potential impact of CVE-2025-61647 is limited due to its low severity score and the conditions required for exploitation. An attacker with low privileges and the need for user interaction could exploit the directory traversal flaw to access files outside the intended directories. This could lead to limited exposure of sensitive information related to user data or system files within Wikimedia Foundation deployments using the vulnerable CheckUser versions. However, there is no impact on data integrity or system availability, reducing the risk of disruption or data manipulation. Since the CheckUser extension is primarily used by Wikimedia administrators, the broader impact on organizations worldwide is minimal. The absence of known exploits in the wild further reduces immediate risk. Nevertheless, if exploited, it could undermine user privacy and trust in Wikimedia services, especially for administrators relying on CheckUser for user investigations.

Mitigation Recommendations

Organizations running Wikimedia Foundation's CheckUser extension should first verify if their deployment uses the affected versions identified by the commit hashes. Since no official patches are linked yet, administrators should monitor Wikimedia security advisories for updates or patches addressing CVE-2025-61647. In the interim, restricting access to the CheckUser interface to trusted administrators only and enforcing strict authentication controls can reduce exploitation risk. Implementing web application firewalls (WAFs) with rules to detect and block directory traversal attempts targeting UserInfoHandler.php can provide additional protection. Regularly auditing server logs for suspicious file path manipulations and user activity related to CheckUser access is recommended. Finally, applying the principle of least privilege to user accounts and limiting exposure of the CheckUser API endpoints to internal networks can further mitigate potential exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
wikimedia-foundation
Date Reserved
2025-09-29T13:18:40.092Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69813e0cf9fa50a62f67cdfb

Added to database: 2/3/2026, 12:15:08 AM

Last enriched: 3/3/2026, 6:29:01 PM

Last updated: 3/19/2026, 12:51:09 PM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses