Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62668: CWE-276 Incorrect Default Permissions in The Wikimedia Foundation Mediawiki - GrowthExperiments Extension

0
Medium
VulnerabilityCVE-2025-62668cvecve-2025-62668cwe-276
Published: Sat Oct 18 2025 (10/18/2025, 04:39:28 UTC)
Source: CVE Database V5
Vendor/Project: The Wikimedia Foundation
Product: Mediawiki - GrowthExperiments Extension

Description

Incorrect Default Permissions vulnerability in The Wikimedia Foundation Mediawiki - GrowthExperiments Extension allows Resource Leak Exposure.This issue affects Mediawiki - GrowthExperiments Extension: from master before 1.39.

AI-Powered Analysis

AILast updated: 10/18/2025, 05:02:05 UTC

Technical Analysis

CVE-2025-62668 is a vulnerability identified in the GrowthExperiments Extension of the Mediawiki platform maintained by the Wikimedia Foundation. The root cause is incorrect default permissions (classified under CWE-276), which means that the extension’s files or resources are accessible with overly permissive settings by default. This misconfiguration can lead to resource leak exposure, where sensitive internal data or experimental configurations might be unintentionally exposed to unauthorized users. The vulnerability affects the master branch of the extension before version 1.39. According to the CVSS 4.0 vector, the attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The vulnerability impacts confidentiality, integrity, and availability to a low degree individually but collectively results in a medium severity rating of 6.9. No known exploits have been reported in the wild, and no official patches have been released at the time of publication. The vulnerability’s exposure risk is heightened in environments where Mediawiki is publicly accessible or used for sensitive collaborative projects. The GrowthExperiments Extension is typically used to conduct A/B testing or feature rollouts, so leaked data could reveal internal testing parameters or user behavior analytics, potentially aiding attackers in crafting targeted attacks or social engineering campaigns.

Potential Impact

For European organizations, especially those relying on Mediawiki for internal documentation, knowledge management, or collaborative projects, this vulnerability poses a risk of unauthorized data exposure. Confidential information related to experimental features or user interactions could be leaked, undermining privacy and competitive advantage. Public-facing Mediawiki instances could inadvertently expose sensitive configuration or experimental data to external attackers, increasing the risk of reconnaissance and follow-on attacks. The impact on integrity is moderate, as attackers might manipulate or infer internal testing states, potentially affecting decision-making processes. Availability impact is low but should not be discounted if resource leaks lead to denial of service or resource exhaustion. The vulnerability is particularly relevant for public institutions, research organizations, and enterprises in Europe that use Mediawiki extensively, as they often handle sensitive or regulated data. Compliance with GDPR and other data protection regulations could be jeopardized if personal or confidential data is exposed through this flaw.

Mitigation Recommendations

European organizations should immediately audit the permissions of the GrowthExperiments Extension files and directories within their Mediawiki deployments. Restrict access to only necessary users and services, ensuring that default permissions are tightened beyond the vulnerable defaults. Implement network-level access controls such as IP whitelisting or VPN requirements for accessing Mediawiki instances hosting this extension. Monitor logs for unusual access patterns or data exfiltration attempts related to the extension. Since no official patch is available yet, consider disabling the GrowthExperiments Extension temporarily if it is not critical to operations. Engage with the Wikimedia Foundation or community to track patch releases and apply updates promptly once available. Additionally, conduct internal security reviews to identify any sensitive data that may have been exposed and perform impact assessments. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the extension. Finally, educate administrators and developers about secure permission configurations to prevent similar issues in other extensions or customizations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
wikimedia-foundation
Date Reserved
2025-10-18T04:03:51.880Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68f31bbeeba81d1dad79f298

Added to database: 10/18/2025, 4:46:54 AM

Last enriched: 10/18/2025, 5:02:05 AM

Last updated: 10/19/2025, 9:50:35 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats