CVE-2025-67482: Vulnerability in Wikimedia Foundation Scribunto
Vulnerability in Wikimedia Foundation Scribunto, Wikimedia Foundation luasandbox. This vulnerability is associated with program files includes/Engines/LuaCommon/lualib/mwInit.Lua, library.C. This issue affects Scribunto: from * before 1.39.16, 1.43.6, 1.44.3, 1.45.1; luasandbox: from * before fea2304f8f6ab30314369a612f4f5b165e68e95a.
AI Analysis
Technical Summary
CVE-2025-67482 identifies a vulnerability within the Scribunto extension of the Wikimedia Foundation's MediaWiki platform, specifically in the luasandbox component responsible for executing Lua scripts safely. The affected code resides in includes/Engines/LuaCommon/lualib/mwInit.Lua and library.C, which are core to the Lua environment initialization and sandboxing mechanisms. The vulnerability affects all versions of Scribunto prior to 1.39.16, 1.43.6, 1.44.3, and 1.45.1, as well as luasandbox before a specific commit (fea2304f8f6ab30314369a612f4f5b165e68e95a). The CVSS 4.0 vector indicates a network attack vector (AV:N) with high attack complexity (AC:H), partial authentication required (AT:P), no privileges required (PR:N), no user interaction (UI:N), and no impact on confidentiality, integrity, or availability (VC:N/VI:N/VA:L). The low CVSS score of 1.7 reflects limited impact and difficulty in exploitation. No known exploits exist in the wild, and no patches are currently linked, suggesting the issue is either newly discovered or under remediation. The vulnerability likely involves a minor flaw in sandbox initialization that could lead to limited information disclosure or minor operational issues but does not allow full compromise or code execution. This vulnerability is relevant primarily to Wikimedia Foundation deployments and any third-party users of Scribunto and luasandbox.
Potential Impact
The potential impact of CVE-2025-67482 is low due to the limited scope of the vulnerability and the low CVSS score. Exploitation does not lead to significant confidentiality, integrity, or availability breaches. The requirement for partial authentication and high attack complexity further reduces the risk. However, organizations running MediaWiki with the Scribunto extension, especially Wikimedia Foundation projects or large wikis relying on Lua scripting, could experience minor disruptions or limited information leakage if exploited. The vulnerability does not enable remote code execution or privilege escalation, so the overall risk to organizational infrastructure and data is minimal. Nonetheless, any vulnerability in widely used open-source components like Scribunto warrants attention to maintain platform security and trust.
Mitigation Recommendations
To mitigate CVE-2025-67482, organizations should: 1) Monitor official Wikimedia Foundation channels for patches or updates addressing this vulnerability and apply them promptly once available. 2) Restrict access to MediaWiki administrative and scripting interfaces to trusted users to reduce the risk of exploitation requiring partial authentication. 3) Implement network-level controls to limit exposure of MediaWiki instances to untrusted networks. 4) Conduct regular security audits of Lua scripts and sandbox configurations to detect anomalous behavior. 5) Consider disabling or limiting Lua scripting capabilities temporarily if immediate patching is not feasible, balancing functionality and security needs. 6) Maintain up-to-date backups and incident response plans tailored to MediaWiki environments. These targeted actions go beyond generic advice by focusing on the specific context and exploitation conditions of this vulnerability.
Affected Countries
United States, Germany, France, United Kingdom, Canada, Australia, Japan, India, Brazil, Netherlands
CVE-2025-67482: Vulnerability in Wikimedia Foundation Scribunto
Description
Vulnerability in Wikimedia Foundation Scribunto, Wikimedia Foundation luasandbox. This vulnerability is associated with program files includes/Engines/LuaCommon/lualib/mwInit.Lua, library.C. This issue affects Scribunto: from * before 1.39.16, 1.43.6, 1.44.3, 1.45.1; luasandbox: from * before fea2304f8f6ab30314369a612f4f5b165e68e95a.
AI-Powered Analysis
Technical Analysis
CVE-2025-67482 identifies a vulnerability within the Scribunto extension of the Wikimedia Foundation's MediaWiki platform, specifically in the luasandbox component responsible for executing Lua scripts safely. The affected code resides in includes/Engines/LuaCommon/lualib/mwInit.Lua and library.C, which are core to the Lua environment initialization and sandboxing mechanisms. The vulnerability affects all versions of Scribunto prior to 1.39.16, 1.43.6, 1.44.3, and 1.45.1, as well as luasandbox before a specific commit (fea2304f8f6ab30314369a612f4f5b165e68e95a). The CVSS 4.0 vector indicates a network attack vector (AV:N) with high attack complexity (AC:H), partial authentication required (AT:P), no privileges required (PR:N), no user interaction (UI:N), and no impact on confidentiality, integrity, or availability (VC:N/VI:N/VA:L). The low CVSS score of 1.7 reflects limited impact and difficulty in exploitation. No known exploits exist in the wild, and no patches are currently linked, suggesting the issue is either newly discovered or under remediation. The vulnerability likely involves a minor flaw in sandbox initialization that could lead to limited information disclosure or minor operational issues but does not allow full compromise or code execution. This vulnerability is relevant primarily to Wikimedia Foundation deployments and any third-party users of Scribunto and luasandbox.
Potential Impact
The potential impact of CVE-2025-67482 is low due to the limited scope of the vulnerability and the low CVSS score. Exploitation does not lead to significant confidentiality, integrity, or availability breaches. The requirement for partial authentication and high attack complexity further reduces the risk. However, organizations running MediaWiki with the Scribunto extension, especially Wikimedia Foundation projects or large wikis relying on Lua scripting, could experience minor disruptions or limited information leakage if exploited. The vulnerability does not enable remote code execution or privilege escalation, so the overall risk to organizational infrastructure and data is minimal. Nonetheless, any vulnerability in widely used open-source components like Scribunto warrants attention to maintain platform security and trust.
Mitigation Recommendations
To mitigate CVE-2025-67482, organizations should: 1) Monitor official Wikimedia Foundation channels for patches or updates addressing this vulnerability and apply them promptly once available. 2) Restrict access to MediaWiki administrative and scripting interfaces to trusted users to reduce the risk of exploitation requiring partial authentication. 3) Implement network-level controls to limit exposure of MediaWiki instances to untrusted networks. 4) Conduct regular security audits of Lua scripts and sandbox configurations to detect anomalous behavior. 5) Consider disabling or limiting Lua scripting capabilities temporarily if immediate patching is not feasible, balancing functionality and security needs. 6) Maintain up-to-date backups and incident response plans tailored to MediaWiki environments. These targeted actions go beyond generic advice by focusing on the specific context and exploitation conditions of this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- wikimedia-foundation
- Date Reserved
- 2025-12-08T17:51:50.990Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69815a2df9fa50a62f75463a
Added to database: 2/3/2026, 2:15:09 AM
Last enriched: 3/2/2026, 6:32:12 PM
Last updated: 3/19/2026, 11:18:37 PM
Views: 67
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.