CVE-2025-62668: CWE-276 Incorrect Default Permissions in The Wikimedia Foundation Mediawiki - GrowthExperiments Extension
Incorrect Default Permissions vulnerability in The Wikimedia Foundation Mediawiki - GrowthExperiments Extension allows Resource Leak Exposure.This issue affects Mediawiki - GrowthExperiments Extension: from master before 1.39.
AI Analysis
Technical Summary
CVE-2025-62668 is a vulnerability identified in the GrowthExperiments Extension of the Mediawiki platform maintained by the Wikimedia Foundation. The root cause is incorrect default permissions (classified under CWE-276), which means that the extension’s files or resources are accessible with overly permissive settings by default. This misconfiguration can lead to resource leak exposure, where sensitive internal data or experimental configurations might be unintentionally exposed to unauthorized users. The vulnerability affects the master branch of the extension before version 1.39. According to the CVSS 4.0 vector, the attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The vulnerability impacts confidentiality, integrity, and availability to a low degree individually but collectively results in a medium severity rating of 6.9. No known exploits have been reported in the wild, and no official patches have been released at the time of publication. The vulnerability’s exposure risk is heightened in environments where Mediawiki is publicly accessible or used for sensitive collaborative projects. The GrowthExperiments Extension is typically used to conduct A/B testing or feature rollouts, so leaked data could reveal internal testing parameters or user behavior analytics, potentially aiding attackers in crafting targeted attacks or social engineering campaigns.
Potential Impact
For European organizations, especially those relying on Mediawiki for internal documentation, knowledge management, or collaborative projects, this vulnerability poses a risk of unauthorized data exposure. Confidential information related to experimental features or user interactions could be leaked, undermining privacy and competitive advantage. Public-facing Mediawiki instances could inadvertently expose sensitive configuration or experimental data to external attackers, increasing the risk of reconnaissance and follow-on attacks. The impact on integrity is moderate, as attackers might manipulate or infer internal testing states, potentially affecting decision-making processes. Availability impact is low but should not be discounted if resource leaks lead to denial of service or resource exhaustion. The vulnerability is particularly relevant for public institutions, research organizations, and enterprises in Europe that use Mediawiki extensively, as they often handle sensitive or regulated data. Compliance with GDPR and other data protection regulations could be jeopardized if personal or confidential data is exposed through this flaw.
Mitigation Recommendations
European organizations should immediately audit the permissions of the GrowthExperiments Extension files and directories within their Mediawiki deployments. Restrict access to only necessary users and services, ensuring that default permissions are tightened beyond the vulnerable defaults. Implement network-level access controls such as IP whitelisting or VPN requirements for accessing Mediawiki instances hosting this extension. Monitor logs for unusual access patterns or data exfiltration attempts related to the extension. Since no official patch is available yet, consider disabling the GrowthExperiments Extension temporarily if it is not critical to operations. Engage with the Wikimedia Foundation or community to track patch releases and apply updates promptly once available. Additionally, conduct internal security reviews to identify any sensitive data that may have been exposed and perform impact assessments. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the extension. Finally, educate administrators and developers about secure permission configurations to prevent similar issues in other extensions or customizations.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy
CVE-2025-62668: CWE-276 Incorrect Default Permissions in The Wikimedia Foundation Mediawiki - GrowthExperiments Extension
Description
Incorrect Default Permissions vulnerability in The Wikimedia Foundation Mediawiki - GrowthExperiments Extension allows Resource Leak Exposure.This issue affects Mediawiki - GrowthExperiments Extension: from master before 1.39.
AI-Powered Analysis
Technical Analysis
CVE-2025-62668 is a vulnerability identified in the GrowthExperiments Extension of the Mediawiki platform maintained by the Wikimedia Foundation. The root cause is incorrect default permissions (classified under CWE-276), which means that the extension’s files or resources are accessible with overly permissive settings by default. This misconfiguration can lead to resource leak exposure, where sensitive internal data or experimental configurations might be unintentionally exposed to unauthorized users. The vulnerability affects the master branch of the extension before version 1.39. According to the CVSS 4.0 vector, the attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The vulnerability impacts confidentiality, integrity, and availability to a low degree individually but collectively results in a medium severity rating of 6.9. No known exploits have been reported in the wild, and no official patches have been released at the time of publication. The vulnerability’s exposure risk is heightened in environments where Mediawiki is publicly accessible or used for sensitive collaborative projects. The GrowthExperiments Extension is typically used to conduct A/B testing or feature rollouts, so leaked data could reveal internal testing parameters or user behavior analytics, potentially aiding attackers in crafting targeted attacks or social engineering campaigns.
Potential Impact
For European organizations, especially those relying on Mediawiki for internal documentation, knowledge management, or collaborative projects, this vulnerability poses a risk of unauthorized data exposure. Confidential information related to experimental features or user interactions could be leaked, undermining privacy and competitive advantage. Public-facing Mediawiki instances could inadvertently expose sensitive configuration or experimental data to external attackers, increasing the risk of reconnaissance and follow-on attacks. The impact on integrity is moderate, as attackers might manipulate or infer internal testing states, potentially affecting decision-making processes. Availability impact is low but should not be discounted if resource leaks lead to denial of service or resource exhaustion. The vulnerability is particularly relevant for public institutions, research organizations, and enterprises in Europe that use Mediawiki extensively, as they often handle sensitive or regulated data. Compliance with GDPR and other data protection regulations could be jeopardized if personal or confidential data is exposed through this flaw.
Mitigation Recommendations
European organizations should immediately audit the permissions of the GrowthExperiments Extension files and directories within their Mediawiki deployments. Restrict access to only necessary users and services, ensuring that default permissions are tightened beyond the vulnerable defaults. Implement network-level access controls such as IP whitelisting or VPN requirements for accessing Mediawiki instances hosting this extension. Monitor logs for unusual access patterns or data exfiltration attempts related to the extension. Since no official patch is available yet, consider disabling the GrowthExperiments Extension temporarily if it is not critical to operations. Engage with the Wikimedia Foundation or community to track patch releases and apply updates promptly once available. Additionally, conduct internal security reviews to identify any sensitive data that may have been exposed and perform impact assessments. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the extension. Finally, educate administrators and developers about secure permission configurations to prevent similar issues in other extensions or customizations.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- wikimedia-foundation
- Date Reserved
- 2025-10-18T04:03:51.880Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68f31bbeeba81d1dad79f298
Added to database: 10/18/2025, 4:46:54 AM
Last enriched: 10/18/2025, 5:02:05 AM
Last updated: 10/19/2025, 9:50:35 AM
Views: 11
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11940: Uncontrolled Search Path in LibreWolf
HighCVE-2025-11939: Path Traversal in ChurchCRM
MediumCVE-2025-11938: Deserialization in ChurchCRM
MediumAI Chat Data Is History's Most Thorough Record of Enterprise Secrets. Secure It Wisely
MediumAI Agent Security: Whose Responsibility Is It?
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.