Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-6593: Vulnerability in Wikimedia Foundation MediaWiki

0
Low
VulnerabilityCVE-2025-6593cvecve-2025-6593
Published: Mon Feb 02 2026 (02/02/2026, 23:01:28 UTC)
Source: CVE Database V5
Vendor/Project: Wikimedia Foundation
Product: MediaWiki

Description

Vulnerability in Wikimedia Foundation MediaWiki. This vulnerability is associated with program files includes/user/User.Php. This issue affects MediaWiki: from 1.27.0 before 1.39.13, 1.42.7 1.43.2, 1.44.0.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/10/2026, 10:51:41 UTC

Technical Analysis

CVE-2025-6593 is an information disclosure vulnerability identified in the Wikimedia Foundation's MediaWiki software, specifically linked to the includes/user/User.Php file. This vulnerability affects multiple versions of MediaWiki, including all releases from 1.27.0 up to but not including 1.39.13, as well as versions 1.42.7, 1.43.2, and 1.44.0. The weakness is categorized under CWE-200, which pertains to the exposure of sensitive information to unauthorized actors. According to the CVSS 4.0 vector, the attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), but user interaction is necessary (UI:A). The vulnerability results in low confidentiality impact (VC:L) and no impact on integrity or availability. No known exploits currently exist in the wild, and no official patches have been linked yet, although the vulnerability has been publicly disclosed. The flaw could allow an unauthenticated attacker to trick a user into performing an action that exposes sensitive user information, potentially including personal data or internal system details. This could facilitate further reconnaissance or targeted attacks. The affected file, User.Php, is central to user management and authentication processes, making the vulnerability relevant to user data security. Given the widespread use of MediaWiki in public and private sectors, especially for collaborative knowledge bases and documentation, this vulnerability could have broad implications if exploited.

Potential Impact

For European organizations, the primary impact of CVE-2025-6593 lies in the potential unauthorized disclosure of sensitive user or system information hosted on MediaWiki platforms. This could compromise confidentiality, leading to privacy violations or leakage of internal operational details. Public sector entities, educational institutions, and enterprises relying on MediaWiki for documentation or knowledge management are particularly vulnerable. Exposure of user data could undermine trust and lead to regulatory consequences under GDPR if personal data is involved. Although the vulnerability does not affect integrity or availability, the information disclosed could be leveraged by attackers for subsequent attacks such as phishing, social engineering, or privilege escalation attempts. The low CVSS score and lack of known exploits suggest limited immediate risk, but the widespread deployment of MediaWiki in Europe means the attack surface is significant. Organizations with outdated MediaWiki versions are at higher risk, especially if users can be induced to interact with malicious content. The impact is thus primarily reputational and compliance-related, with potential operational risks if sensitive internal information is exposed.

Mitigation Recommendations

European organizations should prioritize upgrading MediaWiki installations to versions beyond those affected as soon as official patches are released by the Wikimedia Foundation. Until patches are available, administrators should restrict access to MediaWiki instances, especially limiting public or unauthenticated access to sensitive user-related pages or functions. Implementing strict Content Security Policies (CSP) and input validation can reduce the risk of user interaction-based exploitation. Monitoring web server logs and user activity for unusual patterns or access attempts can help detect exploitation attempts early. Organizations should also educate users about phishing and social engineering risks, as user interaction is required for exploitation. Where feasible, deploying Web Application Firewalls (WAFs) with custom rules to block suspicious requests targeting User.Php or related endpoints can provide additional protection. Regularly auditing MediaWiki configurations and user permissions will minimize exposure of sensitive information. Finally, ensure compliance with data protection regulations by reviewing data handling and access policies related to MediaWiki content.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
wikimedia-foundation
Date Reserved
2025-06-24T22:27:45.486Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69813004f9fa50a62f63a376

Added to database: 2/2/2026, 11:15:16 PM

Last enriched: 2/10/2026, 10:51:41 AM

Last updated: 3/25/2026, 9:10:34 PM

Views: 32

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses