CVE-2025-62664: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in The Wikimedia Foundation Mediawiki - ImageRating Extension
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in The Wikimedia Foundation Mediawiki - ImageRating Extension allows Stored XSS.This issue affects Mediawiki - ImageRating Extension: from master before 1.39.
AI Analysis
Technical Summary
CVE-2025-62664 is a stored Cross-site Scripting (XSS) vulnerability classified under CWE-79, found in the ImageRating extension of the Mediawiki platform maintained by The Wikimedia Foundation. This vulnerability occurs due to improper neutralization of user-supplied input during the generation of web pages, allowing malicious scripts to be stored and later executed in the context of users visiting the affected pages. The flaw affects the master branch of the ImageRating extension prior to version 1.39. The vulnerability does not require any authentication or user interaction to be exploited, increasing its risk profile. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and low to limited impacts on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). This means an attacker can remotely inject malicious JavaScript code that executes in the browsers of users accessing the vulnerable Mediawiki pages, potentially leading to session hijacking, defacement, or redirection to malicious sites. Although no public exploits have been reported yet, the presence of stored XSS in a widely used wiki platform extension poses a significant risk, especially for public or collaborative environments where user-generated content is common. The vulnerability was published on October 18, 2025, and no patches or fixes were linked at the time of reporting, indicating the need for vigilance and proactive mitigation by administrators.
Potential Impact
For European organizations, the impact of CVE-2025-62664 can be substantial, particularly for those relying on Mediawiki for internal knowledge bases, documentation, or public-facing collaborative platforms. Exploitation could lead to the execution of arbitrary scripts in users' browsers, enabling attackers to steal session cookies, perform actions on behalf of users, deface content, or distribute malware. This compromises confidentiality and integrity of information and can disrupt availability if attackers manipulate or delete content. Public sector entities, educational institutions, and enterprises with open wiki environments are at higher risk due to the collaborative nature of Mediawiki. The vulnerability's ease of exploitation without authentication or user interaction increases the likelihood of automated attacks or mass exploitation campaigns. Additionally, reputational damage and potential regulatory consequences under GDPR may arise if user data is compromised through such attacks.
Mitigation Recommendations
European organizations should take immediate steps to mitigate this vulnerability. First, monitor official Wikimedia Foundation channels for patches or updates to the ImageRating extension and apply them promptly once available. Until patches are released, administrators should consider disabling or removing the ImageRating extension if feasible. Implement strict input validation and sanitization on all user-supplied content to prevent injection of malicious scripts. Deploy Content Security Policies (CSP) that restrict the execution of inline scripts and limit sources of executable code to trusted domains. Regularly audit Mediawiki installations for unauthorized content or suspicious scripts. Educate users and administrators about the risks of XSS and encourage reporting of anomalous behavior. Employ web application firewalls (WAFs) with rules targeting XSS patterns to provide an additional layer of defense. Finally, maintain up-to-date backups of wiki content to enable recovery in case of defacement or data loss.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-62664: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in The Wikimedia Foundation Mediawiki - ImageRating Extension
Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in The Wikimedia Foundation Mediawiki - ImageRating Extension allows Stored XSS.This issue affects Mediawiki - ImageRating Extension: from master before 1.39.
AI-Powered Analysis
Technical Analysis
CVE-2025-62664 is a stored Cross-site Scripting (XSS) vulnerability classified under CWE-79, found in the ImageRating extension of the Mediawiki platform maintained by The Wikimedia Foundation. This vulnerability occurs due to improper neutralization of user-supplied input during the generation of web pages, allowing malicious scripts to be stored and later executed in the context of users visiting the affected pages. The flaw affects the master branch of the ImageRating extension prior to version 1.39. The vulnerability does not require any authentication or user interaction to be exploited, increasing its risk profile. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and low to limited impacts on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). This means an attacker can remotely inject malicious JavaScript code that executes in the browsers of users accessing the vulnerable Mediawiki pages, potentially leading to session hijacking, defacement, or redirection to malicious sites. Although no public exploits have been reported yet, the presence of stored XSS in a widely used wiki platform extension poses a significant risk, especially for public or collaborative environments where user-generated content is common. The vulnerability was published on October 18, 2025, and no patches or fixes were linked at the time of reporting, indicating the need for vigilance and proactive mitigation by administrators.
Potential Impact
For European organizations, the impact of CVE-2025-62664 can be substantial, particularly for those relying on Mediawiki for internal knowledge bases, documentation, or public-facing collaborative platforms. Exploitation could lead to the execution of arbitrary scripts in users' browsers, enabling attackers to steal session cookies, perform actions on behalf of users, deface content, or distribute malware. This compromises confidentiality and integrity of information and can disrupt availability if attackers manipulate or delete content. Public sector entities, educational institutions, and enterprises with open wiki environments are at higher risk due to the collaborative nature of Mediawiki. The vulnerability's ease of exploitation without authentication or user interaction increases the likelihood of automated attacks or mass exploitation campaigns. Additionally, reputational damage and potential regulatory consequences under GDPR may arise if user data is compromised through such attacks.
Mitigation Recommendations
European organizations should take immediate steps to mitigate this vulnerability. First, monitor official Wikimedia Foundation channels for patches or updates to the ImageRating extension and apply them promptly once available. Until patches are released, administrators should consider disabling or removing the ImageRating extension if feasible. Implement strict input validation and sanitization on all user-supplied content to prevent injection of malicious scripts. Deploy Content Security Policies (CSP) that restrict the execution of inline scripts and limit sources of executable code to trusted domains. Regularly audit Mediawiki installations for unauthorized content or suspicious scripts. Educate users and administrators about the risks of XSS and encourage reporting of anomalous behavior. Employ web application firewalls (WAFs) with rules targeting XSS patterns to provide an additional layer of defense. Finally, maintain up-to-date backups of wiki content to enable recovery in case of defacement or data loss.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- wikimedia-foundation
- Date Reserved
- 2025-10-18T04:03:51.879Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68f317da8ff74c446c8a11f3
Added to database: 10/18/2025, 4:30:18 AM
Last enriched: 10/25/2025, 4:46:29 AM
Last updated: 12/1/2025, 5:46:27 AM
Views: 66
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13809: Server-Side Request Forgery in orionsec orion-ops
MediumCVE-2025-13808: Improper Authorization in orionsec orion-ops
MediumCVE-2025-13807: Improper Authorization in orionsec orion-ops
MediumCVE-2025-13806: Improper Authorization in nutzam NutzBoot
MediumCVE-2025-13800: Command Injection in ADSLR NBR1005GPEV2
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.