CVE-2025-11175
Unknown Unknown - Not Provided
Expression Language Injection in Mediawiki DiscussionTools Causes DoS

Publication date: 2026-01-30

Last updated on: 2026-01-30

Assigner: wikimedia-foundation

Description
Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection') vulnerability in The Wikimedia Foundation Mediawiki - DiscussionTools Extension allows Regular Expression Exponential Blowup.This issue affects Mediawiki - DiscussionTools Extension: 1.44, 1.43.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-30
Last Modified
2026-01-30
Generated
2026-05-07
AI Q&A
2026-01-30
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
the_wikimedia_foundation mediawiki_discussiontools_extension 1.44
the_wikimedia_foundation mediawiki_discussiontools_extension 1.43
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-917 The product constructs all or part of an expression language (EL) statement in a framework such as a Java Server Page (JSP) using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended EL statement before it is executed.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an Expression Language Injection in the Wikimedia Foundation Mediawiki DiscussionTools Extension (versions 1.43 and 1.44). It involves improper neutralization of special elements used in expression language statements, which leads to a Regular Expression Exponential Blowup. Essentially, this means that crafted input can cause the system's regular expression processing to consume excessive resources, potentially leading to denial of service or other impacts.


How can this vulnerability impact me? :

The vulnerability can lead to performance degradation or denial of service due to the exponential blowup in regular expression processing. This can cause the Mediawiki DiscussionTools Extension to slow down or become unresponsive when processing maliciously crafted inputs. Additionally, related security improvements have been made to mitigate XSS risks by replacing regex-based HTML manipulation with a safer Remex-based approach, indicating that the vulnerability could also be exploited for cross-site scripting attacks if not addressed. [1]


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, update the MediaWiki DiscussionTools extension to versions 1.43.4, 1.44.1, or later, which include a security-driven refactor replacing regex-based HTML manipulation with a safer Remex-based approach. This update addresses the Expression Language Injection vulnerability by removing fragile regex HTML replacements and improving security. Applying these updates will reduce the risk of Regular Expression Exponential Blowup and related XSS issues. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart