CVE-2025-11175
Expression Language Injection in Mediawiki DiscussionTools Causes DoS
Publication date: 2026-01-30
Last updated on: 2026-01-30
Assigner: wikimedia-foundation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| the_wikimedia_foundation | mediawiki_discussiontools_extension | 1.44 |
| the_wikimedia_foundation | mediawiki_discussiontools_extension | 1.43 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-917 | The product constructs all or part of an expression language (EL) statement in a framework such as a Java Server Page (JSP) using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended EL statement before it is executed. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an Expression Language Injection in the Wikimedia Foundation Mediawiki DiscussionTools Extension (versions 1.43 and 1.44). It involves improper neutralization of special elements used in expression language statements, which leads to a Regular Expression Exponential Blowup. Essentially, this means that crafted input can cause the system's regular expression processing to consume excessive resources, potentially leading to denial of service or other impacts.
How can this vulnerability impact me? :
The vulnerability can lead to performance degradation or denial of service due to the exponential blowup in regular expression processing. This can cause the Mediawiki DiscussionTools Extension to slow down or become unresponsive when processing maliciously crafted inputs. Additionally, related security improvements have been made to mitigate XSS risks by replacing regex-based HTML manipulation with a safer Remex-based approach, indicating that the vulnerability could also be exploited for cross-site scripting attacks if not addressed. [1]
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the MediaWiki DiscussionTools extension to versions 1.43.4, 1.44.1, or later, which include a security-driven refactor replacing regex-based HTML manipulation with a safer Remex-based approach. This update addresses the Expression Language Injection vulnerability by removing fragile regex HTML replacements and improving security. Applying these updates will reduce the risk of Regular Expression Exponential Blowup and related XSS issues. [1]