CVE-2025-62699
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-21

Last updated on: 2025-10-21

Assigner: wikimedia-foundation

Description
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in The Wikimedia Foundation Mediawiki - Translate Extension allows Footprinting. Translate extension appears to use jobs to make edits to translation pages. This causes the CheckUser tool to log the wrong IP and User-Agent making these edits un-auditable via the CheckUser tool.This issue affects Mediawiki - Translate Extension: from master before 1.39.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-21
Last Modified
2025-10-21
Generated
2026-05-07
AI Q&A
2025-10-21
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
wikimedia mediawiki 1.39
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-200 The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an Exposure of Sensitive Information to an Unauthorized Actor in the Wikimedia Foundation Mediawiki - CheckUser Extension. It allows an attacker to perform Footprinting, which means gathering information about the system or users without authorization. The issue affects versions from master before 1.39 of the CheckUser Extension.


How can this vulnerability impact me? :

This vulnerability can lead to unauthorized disclosure of sensitive information, potentially allowing attackers to gather data about users or the system. This could compromise privacy and security by exposing information that should be protected.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart