CVE-2025-67482: Vulnerability in Wikimedia Foundation Scribunto
CVE-2025-67482 is a low-severity vulnerability affecting the Wikimedia Foundation's Scribunto extension and its luasandbox component. It impacts multiple versions of Scribunto prior to 1. 39. 16, 1. 43. 6, 1. 44. 3, and 1. 45. 1, as well as luasandbox before a specific commit.
AI Analysis
Technical Summary
CVE-2025-67482 is a vulnerability identified in the Wikimedia Foundation's Scribunto extension, which integrates Lua scripting capabilities into MediaWiki platforms, and its luasandbox component responsible for safely executing Lua code. The issue is located in the LuaCommon library files includes/Engines/LuaCommon/lualib/mwInit.Lua and library.C. Affected versions include all versions of Scribunto prior to 1.39.16, 1.43.6, 1.44.3, and 1.45.1, as well as luasandbox versions before commit fea2304f8f6ab30314369a612f4f5b165e68e95a. The vulnerability has a CVSS 4.0 base score of 1.7, reflecting low severity due to its limited impact and high attack complexity. It does not require privileges, user interaction, or network authentication, but the attack complexity is high, and the impact on confidentiality, integrity, and availability is minimal. No known exploits have been reported in the wild. The vulnerability likely involves a minor flaw in the initialization or sandboxing logic of Lua scripts that could theoretically allow limited unauthorized actions or information leakage, but the exact technical exploit details are not disclosed. The Wikimedia Foundation has published this vulnerability and is expected to release patches in the affected versions. Organizations running MediaWiki instances with Scribunto enabled should plan to update accordingly. Given the nature of the vulnerability and the low CVSS score, this issue is not critical but should be addressed to maintain security hygiene.
Potential Impact
For European organizations, the impact of CVE-2025-67482 is minimal due to its low severity score and lack of known exploits. The vulnerability affects the Scribunto extension used in MediaWiki platforms, which are commonly employed for collaborative documentation and knowledge bases, including Wikimedia projects like Wikipedia. Organizations hosting internal or public MediaWiki instances with Scribunto enabled could theoretically be exposed to minor risks such as limited information leakage or script execution anomalies. However, the high attack complexity and absence of required privileges or user interaction significantly reduce the likelihood of successful exploitation. The vulnerability does not threaten critical infrastructure or sensitive data confidentiality, integrity, or availability in a meaningful way. Nonetheless, European entities relying on Wikimedia technologies should remain vigilant, as any compromise of collaborative platforms could undermine trust and information reliability. The impact is primarily reputational and operational rather than catastrophic, making it a low-priority issue in the broader cybersecurity landscape.
Mitigation Recommendations
To mitigate CVE-2025-67482, European organizations should: 1) Monitor official Wikimedia Foundation security advisories for patch releases addressing this vulnerability. 2) Plan and execute timely updates of the Scribunto extension to versions 1.39.16, 1.43.6, 1.44.3, 1.45.1 or later, and update luasandbox to the specified commit or newer. 3) Audit MediaWiki instances to identify the presence and version of Scribunto and luasandbox components. 4) Restrict access to MediaWiki administrative interfaces and Lua scripting capabilities to trusted users only, minimizing potential exploitation vectors. 5) Implement logging and monitoring of Lua script execution within MediaWiki to detect anomalous behavior. 6) Employ network segmentation and firewall rules to limit exposure of MediaWiki servers to untrusted networks. 7) Educate administrators on the importance of applying security patches promptly, even for low-severity vulnerabilities, to maintain overall platform integrity. These steps go beyond generic advice by focusing on specific version upgrades, access controls, and monitoring tailored to the Wikimedia Scribunto environment.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden
CVE-2025-67482: Vulnerability in Wikimedia Foundation Scribunto
Description
CVE-2025-67482 is a low-severity vulnerability affecting the Wikimedia Foundation's Scribunto extension and its luasandbox component. It impacts multiple versions of Scribunto prior to 1. 39. 16, 1. 43. 6, 1. 44. 3, and 1. 45. 1, as well as luasandbox before a specific commit.
AI-Powered Analysis
Technical Analysis
CVE-2025-67482 is a vulnerability identified in the Wikimedia Foundation's Scribunto extension, which integrates Lua scripting capabilities into MediaWiki platforms, and its luasandbox component responsible for safely executing Lua code. The issue is located in the LuaCommon library files includes/Engines/LuaCommon/lualib/mwInit.Lua and library.C. Affected versions include all versions of Scribunto prior to 1.39.16, 1.43.6, 1.44.3, and 1.45.1, as well as luasandbox versions before commit fea2304f8f6ab30314369a612f4f5b165e68e95a. The vulnerability has a CVSS 4.0 base score of 1.7, reflecting low severity due to its limited impact and high attack complexity. It does not require privileges, user interaction, or network authentication, but the attack complexity is high, and the impact on confidentiality, integrity, and availability is minimal. No known exploits have been reported in the wild. The vulnerability likely involves a minor flaw in the initialization or sandboxing logic of Lua scripts that could theoretically allow limited unauthorized actions or information leakage, but the exact technical exploit details are not disclosed. The Wikimedia Foundation has published this vulnerability and is expected to release patches in the affected versions. Organizations running MediaWiki instances with Scribunto enabled should plan to update accordingly. Given the nature of the vulnerability and the low CVSS score, this issue is not critical but should be addressed to maintain security hygiene.
Potential Impact
For European organizations, the impact of CVE-2025-67482 is minimal due to its low severity score and lack of known exploits. The vulnerability affects the Scribunto extension used in MediaWiki platforms, which are commonly employed for collaborative documentation and knowledge bases, including Wikimedia projects like Wikipedia. Organizations hosting internal or public MediaWiki instances with Scribunto enabled could theoretically be exposed to minor risks such as limited information leakage or script execution anomalies. However, the high attack complexity and absence of required privileges or user interaction significantly reduce the likelihood of successful exploitation. The vulnerability does not threaten critical infrastructure or sensitive data confidentiality, integrity, or availability in a meaningful way. Nonetheless, European entities relying on Wikimedia technologies should remain vigilant, as any compromise of collaborative platforms could undermine trust and information reliability. The impact is primarily reputational and operational rather than catastrophic, making it a low-priority issue in the broader cybersecurity landscape.
Mitigation Recommendations
To mitigate CVE-2025-67482, European organizations should: 1) Monitor official Wikimedia Foundation security advisories for patch releases addressing this vulnerability. 2) Plan and execute timely updates of the Scribunto extension to versions 1.39.16, 1.43.6, 1.44.3, 1.45.1 or later, and update luasandbox to the specified commit or newer. 3) Audit MediaWiki instances to identify the presence and version of Scribunto and luasandbox components. 4) Restrict access to MediaWiki administrative interfaces and Lua scripting capabilities to trusted users only, minimizing potential exploitation vectors. 5) Implement logging and monitoring of Lua script execution within MediaWiki to detect anomalous behavior. 6) Employ network segmentation and firewall rules to limit exposure of MediaWiki servers to untrusted networks. 7) Educate administrators on the importance of applying security patches promptly, even for low-severity vulnerabilities, to maintain overall platform integrity. These steps go beyond generic advice by focusing on specific version upgrades, access controls, and monitoring tailored to the Wikimedia Scribunto environment.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- wikimedia-foundation
- Date Reserved
- 2025-12-08T17:51:50.990Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69815a2df9fa50a62f75463a
Added to database: 2/3/2026, 2:15:09 AM
Last enriched: 2/3/2026, 2:29:59 AM
Last updated: 2/3/2026, 4:45:08 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-24936: CWE-20 Improper Input Validation in ASUSTOR ADM
CriticalCVE-2026-1788: CWE-787: Out-of-bounds Write in Xquic Project Xquic Server
MediumCVE-2026-0909: CWE-639 Authorization Bypass Through User-Controlled Key in alimir WP ULike – Engagement Analytics & Interactive Buttons to Understand Your Audience
MediumCVE-2026-0383: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Brocade Fabric OS
HighCVE-2025-58383: CWE-250: Execution with Unnecessary Privileges in Brocade Fabric OS
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.