Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62661: CWE-276 Incorrect Default Permissions in The Wikimedia Foundation Mediawiki - Thanks Extension, Mediawiki - Growth Experiments Extension

0
Medium
VulnerabilityCVE-2025-62661cvecve-2025-62661cwe-276
Published: Tue Oct 21 2025 (10/21/2025, 19:33:26 UTC)
Source: CVE Database V5
Vendor/Project: The Wikimedia Foundation
Product: Mediawiki - Thanks Extension, Mediawiki - Growth Experiments Extension

Description

Incorrect Default Permissions vulnerability in The Wikimedia Foundation Mediawiki - Thanks Extension, Mediawiki - Growth Experiments Extension allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Mediawiki - Thanks Extension, Mediawiki - Growth Experiments Extension: from 1.43 before 1.44.

AI-Powered Analysis

AILast updated: 10/21/2025, 19:50:56 UTC

Technical Analysis

CVE-2025-62661 identifies an incorrect default permissions vulnerability (CWE-276) in the Wikimedia Foundation's Mediawiki Thanks Extension and Growth Experiments Extension, affecting versions from 1.43 before 1.44. The vulnerability allows unauthorized users to access functionality that should be restricted by ACLs, due to improper default permission settings. This flaw can be exploited remotely over the network without requiring authentication or user interaction, increasing the attack surface. The CVSS 4.0 base score is 6.9 (medium), reflecting the ease of exploitation and moderate impact on confidentiality, integrity, and availability. The vulnerability could allow attackers to perform unauthorized actions or access sensitive features within Mediawiki installations using these extensions, potentially leading to information disclosure or manipulation of wiki content or experiments. No public exploits are known at this time, but the issue is significant for organizations relying on Mediawiki for collaborative knowledge management. The vulnerability affects only specific extensions and versions, with a patch expected in version 1.44 or later. The Wikimedia Foundation assigned and published the CVE promptly after discovery, indicating active maintenance and response.

Potential Impact

For European organizations utilizing Mediawiki with the Thanks and Growth Experiments extensions, this vulnerability poses a risk of unauthorized access to restricted functionality, which could lead to partial data exposure or unauthorized content modifications. This is particularly relevant for public institutions, educational bodies, and enterprises that use Mediawiki for documentation and collaboration. The potential impact includes undermining data integrity and confidentiality, as attackers could exploit the incorrect ACL enforcement to manipulate or view sensitive information. Availability impact is limited but possible if unauthorized actions disrupt normal operations. The medium severity suggests that while the threat is not critical, it could facilitate further attacks or data breaches if left unmitigated. Organizations with public-facing Mediawiki instances are at higher risk due to the network attack vector and lack of authentication requirements. The absence of known exploits reduces immediate urgency but does not eliminate the risk of future exploitation.

Mitigation Recommendations

1. Upgrade affected Mediawiki extensions to version 1.44 or later as soon as the patch is released by the Wikimedia Foundation. 2. In the interim, review and tighten ACL configurations for the Thanks and Growth Experiments extensions to ensure that only authorized users have access to sensitive functionality. 3. Conduct an audit of Mediawiki user roles and permissions to detect and remediate any overly permissive settings. 4. Monitor Mediawiki logs for unusual access patterns or unauthorized attempts to use restricted features. 5. Restrict network access to Mediawiki instances where feasible, using firewalls or VPNs, to limit exposure to untrusted networks. 6. Stay informed on updates from the Wikimedia Foundation regarding this vulnerability and any emerging exploit reports. 7. Consider disabling the affected extensions temporarily if patching or configuration changes are not immediately possible, balancing functionality needs against security risks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
wikimedia-foundation
Date Reserved
2025-10-17T22:01:52.602Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68f7e40601721c03c6e7330b

Added to database: 10/21/2025, 7:50:30 PM

Last enriched: 10/21/2025, 7:50:56 PM

Last updated: 10/23/2025, 8:10:46 PM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats