CVE-2025-62661: CWE-276 Incorrect Default Permissions in The Wikimedia Foundation Mediawiki - Thanks Extension, Mediawiki - Growth Experiments Extension
Incorrect Default Permissions vulnerability in The Wikimedia Foundation Mediawiki - Thanks Extension, Mediawiki - Growth Experiments Extension allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Mediawiki - Thanks Extension, Mediawiki - Growth Experiments Extension: from 1.43 before 1.44.
AI Analysis
Technical Summary
CVE-2025-62661 identifies an incorrect default permissions vulnerability (CWE-276) in the Wikimedia Foundation's Mediawiki Thanks Extension and Growth Experiments Extension, affecting versions from 1.43 before 1.44. The vulnerability allows unauthorized users to access functionality that should be restricted by ACLs, due to improper default permission settings. This flaw can be exploited remotely over the network without requiring authentication or user interaction, increasing the attack surface. The CVSS 4.0 base score is 6.9 (medium), reflecting the ease of exploitation and moderate impact on confidentiality, integrity, and availability. The vulnerability could allow attackers to perform unauthorized actions or access sensitive features within Mediawiki installations using these extensions, potentially leading to information disclosure or manipulation of wiki content or experiments. No public exploits are known at this time, but the issue is significant for organizations relying on Mediawiki for collaborative knowledge management. The vulnerability affects only specific extensions and versions, with a patch expected in version 1.44 or later. The Wikimedia Foundation assigned and published the CVE promptly after discovery, indicating active maintenance and response.
Potential Impact
For European organizations utilizing Mediawiki with the Thanks and Growth Experiments extensions, this vulnerability poses a risk of unauthorized access to restricted functionality, which could lead to partial data exposure or unauthorized content modifications. This is particularly relevant for public institutions, educational bodies, and enterprises that use Mediawiki for documentation and collaboration. The potential impact includes undermining data integrity and confidentiality, as attackers could exploit the incorrect ACL enforcement to manipulate or view sensitive information. Availability impact is limited but possible if unauthorized actions disrupt normal operations. The medium severity suggests that while the threat is not critical, it could facilitate further attacks or data breaches if left unmitigated. Organizations with public-facing Mediawiki instances are at higher risk due to the network attack vector and lack of authentication requirements. The absence of known exploits reduces immediate urgency but does not eliminate the risk of future exploitation.
Mitigation Recommendations
1. Upgrade affected Mediawiki extensions to version 1.44 or later as soon as the patch is released by the Wikimedia Foundation. 2. In the interim, review and tighten ACL configurations for the Thanks and Growth Experiments extensions to ensure that only authorized users have access to sensitive functionality. 3. Conduct an audit of Mediawiki user roles and permissions to detect and remediate any overly permissive settings. 4. Monitor Mediawiki logs for unusual access patterns or unauthorized attempts to use restricted features. 5. Restrict network access to Mediawiki instances where feasible, using firewalls or VPNs, to limit exposure to untrusted networks. 6. Stay informed on updates from the Wikimedia Foundation regarding this vulnerability and any emerging exploit reports. 7. Consider disabling the affected extensions temporarily if patching or configuration changes are not immediately possible, balancing functionality needs against security risks.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-62661: CWE-276 Incorrect Default Permissions in The Wikimedia Foundation Mediawiki - Thanks Extension, Mediawiki - Growth Experiments Extension
Description
Incorrect Default Permissions vulnerability in The Wikimedia Foundation Mediawiki - Thanks Extension, Mediawiki - Growth Experiments Extension allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Mediawiki - Thanks Extension, Mediawiki - Growth Experiments Extension: from 1.43 before 1.44.
AI-Powered Analysis
Technical Analysis
CVE-2025-62661 identifies an incorrect default permissions vulnerability (CWE-276) in the Wikimedia Foundation's Mediawiki Thanks Extension and Growth Experiments Extension, affecting versions from 1.43 before 1.44. The vulnerability allows unauthorized users to access functionality that should be restricted by ACLs, due to improper default permission settings. This flaw can be exploited remotely over the network without requiring authentication or user interaction, increasing the attack surface. The CVSS 4.0 base score is 6.9 (medium), reflecting the ease of exploitation and moderate impact on confidentiality, integrity, and availability. The vulnerability could allow attackers to perform unauthorized actions or access sensitive features within Mediawiki installations using these extensions, potentially leading to information disclosure or manipulation of wiki content or experiments. No public exploits are known at this time, but the issue is significant for organizations relying on Mediawiki for collaborative knowledge management. The vulnerability affects only specific extensions and versions, with a patch expected in version 1.44 or later. The Wikimedia Foundation assigned and published the CVE promptly after discovery, indicating active maintenance and response.
Potential Impact
For European organizations utilizing Mediawiki with the Thanks and Growth Experiments extensions, this vulnerability poses a risk of unauthorized access to restricted functionality, which could lead to partial data exposure or unauthorized content modifications. This is particularly relevant for public institutions, educational bodies, and enterprises that use Mediawiki for documentation and collaboration. The potential impact includes undermining data integrity and confidentiality, as attackers could exploit the incorrect ACL enforcement to manipulate or view sensitive information. Availability impact is limited but possible if unauthorized actions disrupt normal operations. The medium severity suggests that while the threat is not critical, it could facilitate further attacks or data breaches if left unmitigated. Organizations with public-facing Mediawiki instances are at higher risk due to the network attack vector and lack of authentication requirements. The absence of known exploits reduces immediate urgency but does not eliminate the risk of future exploitation.
Mitigation Recommendations
1. Upgrade affected Mediawiki extensions to version 1.44 or later as soon as the patch is released by the Wikimedia Foundation. 2. In the interim, review and tighten ACL configurations for the Thanks and Growth Experiments extensions to ensure that only authorized users have access to sensitive functionality. 3. Conduct an audit of Mediawiki user roles and permissions to detect and remediate any overly permissive settings. 4. Monitor Mediawiki logs for unusual access patterns or unauthorized attempts to use restricted features. 5. Restrict network access to Mediawiki instances where feasible, using firewalls or VPNs, to limit exposure to untrusted networks. 6. Stay informed on updates from the Wikimedia Foundation regarding this vulnerability and any emerging exploit reports. 7. Consider disabling the affected extensions temporarily if patching or configuration changes are not immediately possible, balancing functionality needs against security risks.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- wikimedia-foundation
- Date Reserved
- 2025-10-17T22:01:52.602Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68f7e40601721c03c6e7330b
Added to database: 10/21/2025, 7:50:30 PM
Last enriched: 10/21/2025, 7:50:56 PM
Last updated: 10/23/2025, 8:10:46 PM
Views: 14
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-54966: n/a
UnknownCVE-2025-54964: n/a
UnknownCVE-2025-58428: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') in Veeder-Root TLS4B Automatic Tank Gauge System
CriticalCVE-2025-62236: CWE-204 Observable Response Discrepancy in Frontier Airlines flyfrontier.com
MediumCVE-2025-55067: CWE-190 Integer Overflow or Wraparound in Veeder-Root TLS4B Automatic Tank Gauge System
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.