Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-6590: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Wikimedia Foundation MediaWiki

0
Medium
VulnerabilityCVE-2025-6590cvecve-2025-6590cwe-200
Published: Mon Feb 02 2026 (02/02/2026, 23:03:07 UTC)
Source: CVE Database V5
Vendor/Project: Wikimedia Foundation
Product: MediaWiki

Description

CVE-2025-6590 is a medium-severity vulnerability in Wikimedia Foundation's MediaWiki software that leads to exposure of sensitive information to unauthorized actors. It affects all versions up to 1. 39. 12, 1. 42. 76, 1. 43. 1, and 1. 44. 0, specifically involving the HTMLUserTextField.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/10/2026, 10:55:26 UTC

Technical Analysis

CVE-2025-6590 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) affecting the MediaWiki software developed by the Wikimedia Foundation. The issue resides in the program file includes/htmlform/fields/HTMLUserTextField.Php, which is responsible for handling user text input fields within MediaWiki forms. This vulnerability allows an attacker to remotely access sensitive information that should be restricted, without requiring authentication. However, exploitation requires user interaction and has a high attack complexity, indicating that the attacker must overcome significant hurdles or trick users to trigger the exposure. The vulnerability affects all versions of MediaWiki up to 1.39.12, 1.42.76, 1.43.1, and 1.44.0, meaning a broad range of deployments are potentially vulnerable. The CVSS 4.0 vector indicates network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:N), user interaction required (UI:A), low confidentiality impact (VC:L), and no impact on integrity or availability. No known exploits have been reported in the wild, and no patches are currently linked, suggesting that remediation may be pending or in development. The vulnerability could allow unauthorized actors to glean sensitive data from MediaWiki installations, potentially exposing internal documentation, user data, or configuration details depending on the deployment context.

Potential Impact

For European organizations, the exposure of sensitive information through MediaWiki could lead to confidentiality breaches impacting internal knowledge bases, project documentation, or user data. This could undermine trust, lead to information leakage, and potentially facilitate further attacks if sensitive configuration or user details are exposed. Public sector entities, educational institutions, and enterprises that rely on MediaWiki for collaborative content management are particularly at risk. While the vulnerability does not affect integrity or availability, the unauthorized disclosure of sensitive information could violate data protection regulations such as GDPR, leading to legal and reputational consequences. The requirement for user interaction and high attack complexity somewhat limits the risk, but targeted phishing or social engineering campaigns could exploit this vector. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as patches are not yet available.

Mitigation Recommendations

European organizations should monitor official Wikimedia Foundation channels for patch releases addressing CVE-2025-6590 and apply updates promptly once available. Until patches are released, administrators should restrict access to sensitive MediaWiki content using strict access controls and consider disabling or limiting the use of HTMLUserTextField components if feasible. Implementing robust user awareness training to reduce the risk of social engineering or phishing that could trigger the vulnerability is critical. Network-level protections such as web application firewalls (WAFs) can be tuned to detect and block suspicious requests targeting the vulnerable component. Regular audits of MediaWiki configurations and content permissions can help identify and minimize exposure of sensitive information. Additionally, logging and monitoring should be enhanced to detect unusual access patterns that might indicate exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
wikimedia-foundation
Date Reserved
2025-06-24T22:27:41.836Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69813004f9fa50a62f63a36e

Added to database: 2/2/2026, 11:15:16 PM

Last enriched: 2/10/2026, 10:55:26 AM

Last updated: 3/24/2026, 10:43:15 AM

Views: 48

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses