Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67476: Vulnerability in Wikimedia Foundation MediaWiki

0
Low
VulnerabilityCVE-2025-67476cvecve-2025-67476
Published: Tue Feb 03 2026 (02/03/2026, 01:18:55 UTC)
Source: CVE Database V5
Vendor/Project: Wikimedia Foundation
Product: MediaWiki

Description

CVE-2025-67476 is a low-severity vulnerability in the Wikimedia Foundation's MediaWiki software affecting versions before 1. 44. 3 and 1. 45. 1. It involves a flaw in the ImportableOldRevisionImporter. php file, potentially allowing limited unauthorized access or manipulation. The vulnerability requires network access and low privileges but no user interaction. Exploitation does not impact confidentiality, integrity, or availability significantly. No known exploits are currently in the wild, and no patches have been linked yet.

AI-Powered Analysis

AILast updated: 02/03/2026, 01:44:32 UTC

Technical Analysis

CVE-2025-67476 is a vulnerability identified in the MediaWiki software maintained by the Wikimedia Foundation, specifically within the ImportableOldRevisionImporter.php file. This vulnerability affects all versions prior to 1.44.3 and 1.45.1. The issue is characterized by a low CVSS 4.0 score of 1.3, indicating minimal impact and ease of exploitation. The vector indicates network attack (AV:N), low attack complexity (AC:L), no privileges required (PR:L), and no user interaction (UI:N). The vulnerability does not affect confidentiality, integrity, or availability significantly (VC:L, VI:N, VA:N). It appears to be a minor flaw possibly related to improper handling of import operations or old revision imports, which could allow limited unauthorized actions or information disclosure. No known exploits have been reported in the wild, and no official patches have been linked yet, though the affected versions are clearly defined. The vulnerability was reserved in December 2025 and published in February 2026, indicating recent discovery. Given the nature of MediaWiki as a widely used platform for collaborative content management, especially in public and educational institutions, this vulnerability, while low risk, should be addressed promptly to maintain system integrity.

Potential Impact

The impact of CVE-2025-67476 on European organizations is expected to be minimal due to its low severity and limited scope. MediaWiki is commonly used by governmental agencies, educational institutions, and public sector organizations across Europe for knowledge management and documentation. Exploitation could potentially allow an attacker with low privileges to perform limited unauthorized import operations or access old revision data, but it does not compromise core confidentiality, integrity, or availability. However, if exploited in a targeted manner, it could facilitate minor data inconsistencies or unauthorized content modifications in collaborative environments. The absence of known exploits reduces immediate risk, but organizations relying heavily on MediaWiki should remain vigilant. The impact is more operational than critical, with no direct threat to critical infrastructure or sensitive data confidentiality.

Mitigation Recommendations

To mitigate CVE-2025-67476, European organizations should: 1) Monitor official Wikimedia Foundation channels for the release of security patches addressing this vulnerability and apply them promptly once available. 2) Restrict network access to MediaWiki import functionalities to trusted administrators only, minimizing exposure to potential attackers. 3) Implement strict access controls and audit logging around import operations to detect any unauthorized attempts. 4) Regularly update MediaWiki installations to the latest stable versions to benefit from ongoing security improvements. 5) Conduct internal security reviews of MediaWiki configurations, especially focusing on import-related features and permissions. 6) Educate administrators about the risks associated with import operations and ensure they follow best practices for secure content management. These steps go beyond generic advice by focusing on the specific import functionality implicated in the vulnerability and emphasizing proactive monitoring and access restriction.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
wikimedia-foundation
Date Reserved
2025-12-08T17:51:48.871Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69814fa1f9fa50a62f7207f4

Added to database: 2/3/2026, 1:30:09 AM

Last enriched: 2/3/2026, 1:44:32 AM

Last updated: 2/3/2026, 4:45:17 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats