CVE-2025-32079

6.5 MEDIUM

📋 TL;DR

An improper input validation vulnerability in Wikimedia's GrowthExperiments MediaWiki extension allows attackers to cause HTTP denial-of-service (DoS) conditions. This affects MediaWiki installations with the GrowthExperiments extension enabled, specifically versions 1.39 through 1.43. Attackers can exploit this to disrupt service availability.

💻 Affected Systems

Products:
  • MediaWiki - GrowthExperiments extension
Versions: 1.39 through 1.43
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations with the GrowthExperiments extension enabled. MediaWiki core is not directly vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service unavailability for MediaWiki instances, preventing legitimate users from accessing content or editing functionality.

🟠

Likely Case

Partial service degradation with increased response times, failed requests, and intermittent availability issues.

🟢

If Mitigated

Minimal impact with proper rate limiting, input validation, and monitoring in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability involves improper input validation that can be triggered via HTTP requests, making exploitation relatively straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.44 or later

Vendor Advisory: https://phabricator.wikimedia.org/T384244

Restart Required: No

Instructions:

1. Update the GrowthExperiments extension to version 1.44 or later. 2. If using MediaWiki's extension management, run update.php. 3. Verify the extension version in LocalSettings.php or via Special:Version.

🔧 Temporary Workarounds

Disable GrowthExperiments extension

all

Temporarily disable the vulnerable extension until patching is possible

Edit LocalSettings.php and comment out or remove: wfLoadExtension('GrowthExperiments');

Implement rate limiting

linux

Configure web server or application rate limiting to mitigate DoS attempts

For Apache: Set LimitRequestBody and LimitRequestFields
For Nginx: limit_req_zone and limit_req directives

🧯 If You Can't Patch

  • Implement strict input validation and sanitization at the web application firewall (WAF) level.
  • Monitor for abnormal HTTP request patterns and implement automated blocking of suspicious IP addresses.

🔍 How to Verify

Check if Vulnerable:

Check the GrowthExperiments extension version via MediaWiki's Special:Version page or examine LocalSettings.php for wfLoadExtension('GrowthExperiments') with version 1.39-1.43.

Check Version:

php maintenance/run.php ./extensions/GrowthExperiments/maintenance/checkVersion.php

Verify Fix Applied:

Confirm GrowthExperiments extension version is 1.44 or higher via Special:Version page.

📡 Detection & Monitoring

Log Indicators:

  • Unusually high number of HTTP requests to GrowthExperiments endpoints
  • Increased error rates (4xx/5xx) from GrowthExperiments functionality
  • Requests with malformed or unexpected input patterns

Network Indicators:

  • Spike in traffic to /w/rest.php/v1/growth* endpoints
  • Abnormal request patterns from single IP addresses

SIEM Query:

source="apache_access" OR source="nginx_access" | where url_path LIKE "/w/rest.php/v1/growth%" | stats count by src_ip | where count > 100

🔗 References

📤 Share & Export