Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61653: Vulnerability in Wikimedia Foundation TextExtracts

0
Low
VulnerabilityCVE-2025-61653cvecve-2025-61653
Published: Tue Feb 03 2026 (02/03/2026, 00:57:17 UTC)
Source: CVE Database V5
Vendor/Project: Wikimedia Foundation
Product: TextExtracts

Description

CVE-2025-61653 is a low-severity vulnerability affecting the Wikimedia Foundation's TextExtracts extension, specifically in the includes/ApiQueryExtracts. php file. It impacts versions before 1. 39. 14, 1. 43. 4, and 1. 44. 1. The vulnerability has a CVSS 4.

AI-Powered Analysis

AILast updated: 02/03/2026, 01:45:00 UTC

Technical Analysis

CVE-2025-61653 identifies a vulnerability in the Wikimedia Foundation's TextExtracts extension, which is used to provide text extraction capabilities from MediaWiki content. The issue resides in the includes/ApiQueryExtracts.php file, affecting versions prior to 1.39.14, 1.43.4, and 1.44.1. The vulnerability is characterized by a low CVSS 4.0 score of 2.7, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact is limited to a low confidentiality impact (VC:L) with no effect on integrity or availability. This suggests that an attacker could potentially gain limited access to information or data exposure without the ability to alter or disrupt the system. No known exploits are currently active in the wild, and no patches or exploit code have been publicly disclosed at this time. The vulnerability does not require authentication or user interaction, which theoretically increases the attack surface, but the low impact reduces the overall risk. The affected component, TextExtracts, is commonly used in Wikimedia projects and potentially in other MediaWiki deployments that utilize this extension for content extraction. The vulnerability's root cause details are not fully disclosed, but the affected file indicates it is related to API query processing. This could imply improper handling of API requests or insufficient validation leading to information leakage. The Wikimedia Foundation has reserved the CVE and published the vulnerability details, signaling that fixes are likely available or forthcoming in the specified versions. Organizations running affected versions should prioritize updating to the patched releases to eliminate the vulnerability.

Potential Impact

For European organizations, the impact of CVE-2025-61653 is limited due to its low severity score and absence of known exploits. The vulnerability could lead to minor information disclosure through the Wikimedia TextExtracts API, potentially exposing some content or metadata unintentionally. However, it does not compromise system integrity or availability, nor does it require authentication or user interaction, which reduces the risk of targeted exploitation. Organizations that operate MediaWiki instances with the TextExtracts extension, especially those hosting internal or public knowledge bases, could face slight confidentiality risks if they run vulnerable versions. Given Wikimedia's widespread use in Europe for public and private wikis, the vulnerability could affect institutions relying on these platforms for documentation, collaboration, or content delivery. Nonetheless, the low impact and lack of active exploitation mean the threat is not urgent but should be addressed to prevent future risks. Failure to patch could allow opportunistic attackers to gather limited sensitive information, which might be leveraged in broader reconnaissance or social engineering campaigns.

Mitigation Recommendations

To mitigate CVE-2025-61653, European organizations should take the following specific actions: 1) Identify all MediaWiki instances using the TextExtracts extension and verify their versions. 2) Upgrade TextExtracts to versions 1.39.14, 1.43.4, 1.44.1, or later, where the vulnerability is resolved. 3) Review API access logs for unusual or unexpected queries that might indicate probing attempts. 4) Implement strict API access controls, including IP whitelisting or authentication where feasible, to limit exposure. 5) Monitor Wikimedia Foundation advisories and community forums for any updates or patches related to this CVE. 6) Conduct internal security assessments focusing on API endpoints to detect potential information leakage. 7) Educate administrators about the importance of timely patching and monitoring of MediaWiki extensions. These steps go beyond generic advice by focusing on version management, API security, and proactive monitoring tailored to the Wikimedia TextExtracts context.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
wikimedia-foundation
Date Reserved
2025-09-29T13:18:40.095Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69814fa1f9fa50a62f7207e3

Added to database: 2/3/2026, 1:30:09 AM

Last enriched: 2/3/2026, 1:45:00 AM

Last updated: 2/3/2026, 4:10:51 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats