Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67482: Vulnerability in Wikimedia Foundation Scribunto

0
Low
VulnerabilityCVE-2025-67482cvecve-2025-67482
Published: Tue Feb 03 2026 (02/03/2026, 01:28:56 UTC)
Source: CVE Database V5
Vendor/Project: Wikimedia Foundation
Product: Scribunto

Description

CVE-2025-67482 is a low-severity vulnerability affecting the Wikimedia Foundation's Scribunto extension and its luasandbox component. It impacts multiple versions of Scribunto prior to 1. 39. 16, 1. 43. 6, 1. 44. 3, and 1. 45. 1, as well as luasandbox before a specific commit.

AI-Powered Analysis

AILast updated: 02/03/2026, 02:29:59 UTC

Technical Analysis

CVE-2025-67482 is a vulnerability identified in the Wikimedia Foundation's Scribunto extension, which integrates Lua scripting capabilities into MediaWiki platforms, and its luasandbox component responsible for safely executing Lua code. The issue is located in the LuaCommon library files includes/Engines/LuaCommon/lualib/mwInit.Lua and library.C. Affected versions include all versions of Scribunto prior to 1.39.16, 1.43.6, 1.44.3, and 1.45.1, as well as luasandbox versions before commit fea2304f8f6ab30314369a612f4f5b165e68e95a. The vulnerability has a CVSS 4.0 base score of 1.7, reflecting low severity due to its limited impact and high attack complexity. It does not require privileges, user interaction, or network authentication, but the attack complexity is high, and the impact on confidentiality, integrity, and availability is minimal. No known exploits have been reported in the wild. The vulnerability likely involves a minor flaw in the initialization or sandboxing logic of Lua scripts that could theoretically allow limited unauthorized actions or information leakage, but the exact technical exploit details are not disclosed. The Wikimedia Foundation has published this vulnerability and is expected to release patches in the affected versions. Organizations running MediaWiki instances with Scribunto enabled should plan to update accordingly. Given the nature of the vulnerability and the low CVSS score, this issue is not critical but should be addressed to maintain security hygiene.

Potential Impact

For European organizations, the impact of CVE-2025-67482 is minimal due to its low severity score and lack of known exploits. The vulnerability affects the Scribunto extension used in MediaWiki platforms, which are commonly employed for collaborative documentation and knowledge bases, including Wikimedia projects like Wikipedia. Organizations hosting internal or public MediaWiki instances with Scribunto enabled could theoretically be exposed to minor risks such as limited information leakage or script execution anomalies. However, the high attack complexity and absence of required privileges or user interaction significantly reduce the likelihood of successful exploitation. The vulnerability does not threaten critical infrastructure or sensitive data confidentiality, integrity, or availability in a meaningful way. Nonetheless, European entities relying on Wikimedia technologies should remain vigilant, as any compromise of collaborative platforms could undermine trust and information reliability. The impact is primarily reputational and operational rather than catastrophic, making it a low-priority issue in the broader cybersecurity landscape.

Mitigation Recommendations

To mitigate CVE-2025-67482, European organizations should: 1) Monitor official Wikimedia Foundation security advisories for patch releases addressing this vulnerability. 2) Plan and execute timely updates of the Scribunto extension to versions 1.39.16, 1.43.6, 1.44.3, 1.45.1 or later, and update luasandbox to the specified commit or newer. 3) Audit MediaWiki instances to identify the presence and version of Scribunto and luasandbox components. 4) Restrict access to MediaWiki administrative interfaces and Lua scripting capabilities to trusted users only, minimizing potential exploitation vectors. 5) Implement logging and monitoring of Lua script execution within MediaWiki to detect anomalous behavior. 6) Employ network segmentation and firewall rules to limit exposure of MediaWiki servers to untrusted networks. 7) Educate administrators on the importance of applying security patches promptly, even for low-severity vulnerabilities, to maintain overall platform integrity. These steps go beyond generic advice by focusing on specific version upgrades, access controls, and monitoring tailored to the Wikimedia Scribunto environment.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
wikimedia-foundation
Date Reserved
2025-12-08T17:51:50.990Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69815a2df9fa50a62f75463a

Added to database: 2/3/2026, 2:15:09 AM

Last enriched: 2/3/2026, 2:29:59 AM

Last updated: 2/3/2026, 4:45:08 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats