Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-6927: Vulnerability in Wikimedia Foundation MediaWiki

0
Low
VulnerabilityCVE-2025-6927cvecve-2025-6927
Published: Mon Feb 02 2026 (02/02/2026, 22:55:09 UTC)
Source: CVE Database V5
Vendor/Project: Wikimedia Foundation
Product: MediaWiki

Description

Vulnerability in Wikimedia Foundation MediaWiki. This vulnerability is associated with program files includes/specials/pagers/BlockListPager.Php, includes/api/ApiQueryBlocks.Php. This issue affects MediaWiki: from >= 1.42.0 before 1.39.13, 1.42.7 1.43.2, 1.44.0.

AI-Powered Analysis

AILast updated: 02/02/2026, 23:45:25 UTC

Technical Analysis

CVE-2025-6927 is a vulnerability identified in the MediaWiki software maintained by the Wikimedia Foundation, specifically affecting versions from 1.42.0 and certain earlier versions such as before 1.39.13, 1.42.7, 1.43.2, and 1.44.0. The vulnerability is associated with the files includes/specials/pagers/BlockListPager.php and includes/api/ApiQueryBlocks.php, which handle block listing and querying functionalities within MediaWiki. The CVSS 4.0 base score is 2.3, indicating a low-severity issue. The vector string (AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N) shows that the attack can be performed remotely over the network without privileges but requires user interaction (UI:P). The impact is limited to a low confidentiality breach with no effect on integrity or availability. The vulnerability likely involves information disclosure or minor data leakage related to block lists, but does not allow modification or disruption of the system. No known exploits have been reported in the wild, and no official patches have been linked in the provided data, though the vulnerability is published and reserved since mid-2025. This suggests that the Wikimedia Foundation and users should prioritize patching once fixes are available to prevent potential exploitation.

Potential Impact

For European organizations, the impact of CVE-2025-6927 is relatively low given the vulnerability's limited scope and low severity. MediaWiki is widely used in Europe for collaborative knowledge bases, documentation, and internal wikis across public institutions, universities, and private enterprises. An attacker exploiting this vulnerability could potentially gain limited confidential information related to block lists, which might reveal user or administrative actions but would not compromise critical data or system integrity. The lack of impact on availability means operational disruption is unlikely. However, organizations with sensitive or regulated data hosted on MediaWiki platforms should consider the risk of information leakage as part of their compliance and data protection strategies. Since exploitation requires user interaction, social engineering or phishing could be vectors, emphasizing the need for user awareness. The absence of known exploits reduces immediate risk but does not eliminate the need for vigilance.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Monitor official Wikimedia Foundation channels for patch releases addressing CVE-2025-6927 and apply updates promptly to affected MediaWiki instances. 2) Restrict access to MediaWiki administrative and block list functionalities to trusted users only, employing role-based access controls to minimize exposure. 3) Enhance user awareness training to reduce the risk of social engineering attacks that could trigger the required user interaction for exploitation. 4) Implement network-level protections such as web application firewalls (WAFs) to detect and block suspicious API queries or unusual access patterns targeting the affected endpoints. 5) Regularly audit MediaWiki logs for anomalous activity related to block list queries or special page accesses. 6) Consider isolating MediaWiki installations containing sensitive information within secure network segments to limit external exposure. 7) Employ multi-factor authentication for user accounts with elevated privileges to reduce risk of account compromise that could facilitate exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
wikimedia-foundation
Date Reserved
2025-06-30T14:30:22.357Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69813004f9fa50a62f63a381

Added to database: 2/2/2026, 11:15:16 PM

Last enriched: 2/2/2026, 11:45:25 PM

Last updated: 2/7/2026, 3:27:59 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats