CVE-2025-67476: Vulnerability in Wikimedia Foundation MediaWiki
CVE-2025-67476 is a low-severity vulnerability in the Wikimedia Foundation's MediaWiki software affecting versions before 1. 44. 3 and 1. 45. 1. It involves a flaw in the ImportableOldRevisionImporter. php file, potentially allowing limited unauthorized access or manipulation. The vulnerability requires network access and low privileges but no user interaction. Exploitation does not impact confidentiality, integrity, or availability significantly. No known exploits are currently in the wild, and no patches have been linked yet.
AI Analysis
Technical Summary
CVE-2025-67476 is a vulnerability identified in the MediaWiki software maintained by the Wikimedia Foundation, specifically within the ImportableOldRevisionImporter.php file. This vulnerability affects all versions prior to 1.44.3 and 1.45.1. The issue is characterized by a low CVSS 4.0 score of 1.3, indicating minimal impact and ease of exploitation. The vector indicates network attack (AV:N), low attack complexity (AC:L), no privileges required (PR:L), and no user interaction (UI:N). The vulnerability does not affect confidentiality, integrity, or availability significantly (VC:L, VI:N, VA:N). It appears to be a minor flaw possibly related to improper handling of import operations or old revision imports, which could allow limited unauthorized actions or information disclosure. No known exploits have been reported in the wild, and no official patches have been linked yet, though the affected versions are clearly defined. The vulnerability was reserved in December 2025 and published in February 2026, indicating recent discovery. Given the nature of MediaWiki as a widely used platform for collaborative content management, especially in public and educational institutions, this vulnerability, while low risk, should be addressed promptly to maintain system integrity.
Potential Impact
The impact of CVE-2025-67476 on European organizations is expected to be minimal due to its low severity and limited scope. MediaWiki is commonly used by governmental agencies, educational institutions, and public sector organizations across Europe for knowledge management and documentation. Exploitation could potentially allow an attacker with low privileges to perform limited unauthorized import operations or access old revision data, but it does not compromise core confidentiality, integrity, or availability. However, if exploited in a targeted manner, it could facilitate minor data inconsistencies or unauthorized content modifications in collaborative environments. The absence of known exploits reduces immediate risk, but organizations relying heavily on MediaWiki should remain vigilant. The impact is more operational than critical, with no direct threat to critical infrastructure or sensitive data confidentiality.
Mitigation Recommendations
To mitigate CVE-2025-67476, European organizations should: 1) Monitor official Wikimedia Foundation channels for the release of security patches addressing this vulnerability and apply them promptly once available. 2) Restrict network access to MediaWiki import functionalities to trusted administrators only, minimizing exposure to potential attackers. 3) Implement strict access controls and audit logging around import operations to detect any unauthorized attempts. 4) Regularly update MediaWiki installations to the latest stable versions to benefit from ongoing security improvements. 5) Conduct internal security reviews of MediaWiki configurations, especially focusing on import-related features and permissions. 6) Educate administrators about the risks associated with import operations and ensure they follow best practices for secure content management. These steps go beyond generic advice by focusing on the specific import functionality implicated in the vulnerability and emphasizing proactive monitoring and access restriction.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium
CVE-2025-67476: Vulnerability in Wikimedia Foundation MediaWiki
Description
CVE-2025-67476 is a low-severity vulnerability in the Wikimedia Foundation's MediaWiki software affecting versions before 1. 44. 3 and 1. 45. 1. It involves a flaw in the ImportableOldRevisionImporter. php file, potentially allowing limited unauthorized access or manipulation. The vulnerability requires network access and low privileges but no user interaction. Exploitation does not impact confidentiality, integrity, or availability significantly. No known exploits are currently in the wild, and no patches have been linked yet.
AI-Powered Analysis
Technical Analysis
CVE-2025-67476 is a vulnerability identified in the MediaWiki software maintained by the Wikimedia Foundation, specifically within the ImportableOldRevisionImporter.php file. This vulnerability affects all versions prior to 1.44.3 and 1.45.1. The issue is characterized by a low CVSS 4.0 score of 1.3, indicating minimal impact and ease of exploitation. The vector indicates network attack (AV:N), low attack complexity (AC:L), no privileges required (PR:L), and no user interaction (UI:N). The vulnerability does not affect confidentiality, integrity, or availability significantly (VC:L, VI:N, VA:N). It appears to be a minor flaw possibly related to improper handling of import operations or old revision imports, which could allow limited unauthorized actions or information disclosure. No known exploits have been reported in the wild, and no official patches have been linked yet, though the affected versions are clearly defined. The vulnerability was reserved in December 2025 and published in February 2026, indicating recent discovery. Given the nature of MediaWiki as a widely used platform for collaborative content management, especially in public and educational institutions, this vulnerability, while low risk, should be addressed promptly to maintain system integrity.
Potential Impact
The impact of CVE-2025-67476 on European organizations is expected to be minimal due to its low severity and limited scope. MediaWiki is commonly used by governmental agencies, educational institutions, and public sector organizations across Europe for knowledge management and documentation. Exploitation could potentially allow an attacker with low privileges to perform limited unauthorized import operations or access old revision data, but it does not compromise core confidentiality, integrity, or availability. However, if exploited in a targeted manner, it could facilitate minor data inconsistencies or unauthorized content modifications in collaborative environments. The absence of known exploits reduces immediate risk, but organizations relying heavily on MediaWiki should remain vigilant. The impact is more operational than critical, with no direct threat to critical infrastructure or sensitive data confidentiality.
Mitigation Recommendations
To mitigate CVE-2025-67476, European organizations should: 1) Monitor official Wikimedia Foundation channels for the release of security patches addressing this vulnerability and apply them promptly once available. 2) Restrict network access to MediaWiki import functionalities to trusted administrators only, minimizing exposure to potential attackers. 3) Implement strict access controls and audit logging around import operations to detect any unauthorized attempts. 4) Regularly update MediaWiki installations to the latest stable versions to benefit from ongoing security improvements. 5) Conduct internal security reviews of MediaWiki configurations, especially focusing on import-related features and permissions. 6) Educate administrators about the risks associated with import operations and ensure they follow best practices for secure content management. These steps go beyond generic advice by focusing on the specific import functionality implicated in the vulnerability and emphasizing proactive monitoring and access restriction.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- wikimedia-foundation
- Date Reserved
- 2025-12-08T17:51:48.871Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69814fa1f9fa50a62f7207f4
Added to database: 2/3/2026, 1:30:09 AM
Last enriched: 2/3/2026, 1:44:32 AM
Last updated: 2/3/2026, 4:45:17 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-24936: CWE-20 Improper Input Validation in ASUSTOR ADM
CriticalCVE-2026-1788: CWE-787: Out-of-bounds Write in Xquic Project Xquic Server
MediumCVE-2026-0909: CWE-639 Authorization Bypass Through User-Controlled Key in alimir WP ULike – Engagement Analytics & Interactive Buttons to Understand Your Audience
MediumCVE-2026-0383: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Brocade Fabric OS
HighCVE-2025-67482: Vulnerability in Wikimedia Foundation Scribunto
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.