CVE-2025-53483

8.8 HIGH

📋 TL;DR

This CSRF vulnerability in MediaWiki's SecurePoll extension allows attackers to trick administrators into performing unauthorized sensitive actions like archiving/unarchiving pages or clearing voter eligibility data. It affects MediaWiki installations with the SecurePoll extension enabled, specifically versions 1.39.X before 1.39.13, 1.42.X before 1.42.7, and 1.43.X before 1.43.2.

💻 Affected Systems

Products:
  • MediaWiki SecurePoll Extension
Versions: 1.39.X before 1.39.13, 1.42.X before 1.42.7, 1.43.X before 1.43.2
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations with SecurePoll extension enabled. Requires administrator authentication for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could manipulate poll data, archive/unarchive sensitive pages, or clear voter eligibility data, potentially disrupting elections or compromising poll integrity.

🟠

Likely Case

Unauthorized archiving/unarchiving of pages or clearing of voter eligibility data, leading to data loss or administrative disruption.

🟢

If Mitigated

No impact if proper CSRF protections are implemented or if administrators don't visit malicious sites while authenticated.

🌐 Internet-Facing: HIGH - Attackers can exploit via malicious websites targeting authenticated administrators.
🏢 Internal Only: MEDIUM - Requires administrator to visit malicious site while authenticated to internal systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires administrator to visit malicious site while authenticated. No authentication bypass needed beyond CSRF.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.39.13, 1.42.7, 1.43.2

Vendor Advisory: https://phabricator.wikimedia.org/T392341

Restart Required: No

Instructions:

1. Update MediaWiki to patched version. 2. Update SecurePoll extension if installed separately. 3. Clear caches if applicable.

🔧 Temporary Workarounds

Disable SecurePoll Extension

all

Temporarily disable the vulnerable extension until patching is possible.

Edit LocalSettings.php and comment out or remove wfLoadExtension('SecurePoll');

Implement CSRF Middleware

all

Add custom CSRF validation for affected endpoints.

Add CSRF token validation to ArchivePage.php, UnarchivePage.php, and VoterEligibilityPage#executeClear() methods

🧯 If You Can't Patch

  • Restrict administrator access to trusted networks only
  • Implement strict Content Security Policy to prevent malicious site interactions

🔍 How to Verify

Check if Vulnerable:

Check MediaWiki version and SecurePoll extension version against affected ranges.

Check Version:

Check MediaWiki version in includes/DefaultSettings.php or via Special:Version page

Verify Fix Applied:

Verify MediaWiki version is 1.39.13+, 1.42.7+, or 1.43.2+ and check that CSRF tokens are now validated in affected files.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized archive/unarchive actions
  • Voter eligibility clear actions without proper CSRF tokens
  • Multiple sensitive actions from same administrator in short timeframe

Network Indicators:

  • HTTP POST requests to affected endpoints without CSRF tokens
  • Cross-origin requests to sensitive endpoints

SIEM Query:

source="mediawiki" AND (action="archive" OR action="unarchive" OR action="clear_voter_eligibility") AND csrf_token=""

🔗 References

📤 Share & Export