CVE-2025-67484
Published: 03 February 2026
Summary
CVE-2025-67484 is a critical-severity Improper Input Validation (CWE-20) vulnerability in Mediawiki Mediawiki. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 9.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Mandates timely identification, reporting, and correction of software flaws like this critical CWE-20 input validation vulnerability in MediaWiki's ApiFormatXml.php via patching to fixed versions.
Requires systems to validate all inputs, directly countering the improper input validation (CWE-20) in the MediaWiki API XML format handler exploited by unauthenticated remote attackers.
Enables regular vulnerability scanning to identify and prioritize known issues like CVE-2025-67484 in vulnerable MediaWiki versions for remediation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Direct remote unauthenticated exploitation of a public-facing web application (MediaWiki API endpoint) via improper input validation, enabling full system compromise.
NVD Description
Vulnerability in Wikimedia Foundation MediaWiki. This vulnerability is associated with program files includes/Api/ApiFormatXml.Php. This issue affects MediaWiki: from * before 1.39.16, 1.43.6, 1.44.3, 1.45.1.
Deeper analysisAI
CVE-2025-67484 is a vulnerability in the Wikimedia Foundation's MediaWiki software, specifically associated with the program file includes/Api/ApiFormatXml.php. It affects MediaWiki versions from any release prior to 1.39.16, 1.43.6, 1.44.3, and 1.45.1. Classified under CWE-20 (Improper Input Validation), the issue carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), marking it as critical severity.
The vulnerability enables exploitation over the network by unauthenticated attackers (PR:N) with low attack complexity (AC:L) and no requirement for user interaction (UI:N). Successful exploitation can achieve high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H) within the unchanged scope (S:U), potentially allowing remote compromise of affected MediaWiki instances.
Mitigation is addressed through patches in the specified versions: upgrade to MediaWiki 1.39.16 or later (1.39 branch), 1.43.6 or later (1.43 branch), 1.44.3 or later (1.44 branch), or 1.45.1 or later (1.45 branch). Further details are provided in the Wikimedia Phabricator task at https://phabricator.wikimedia.org/T401995.
Details
- CWE(s)