CVE-2025-61766

6.5 MEDIUM

📋 TL;DR

The Bucket MediaWiki extension prior to version 1.0.0 contains an infinite recursion vulnerability when using the '!=' comparator in queries. This causes PHP call stack exhaustion and excessive memory consumption, leading to denial of service. Any MediaWiki installation using the vulnerable Bucket extension is affected.

💻 Affected Systems

Products:
  • Bucket MediaWiki extension
Versions: All versions prior to 1.0.0
Operating Systems: All operating systems running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the Bucket extension to be installed and enabled on MediaWiki.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service unavailability due to resource exhaustion, potentially affecting all users of the MediaWiki instance.

🟠

Likely Case

Partial or intermittent denial of service affecting users attempting to query buckets with the vulnerable comparator.

🟢

If Mitigated

Minimal impact if the vulnerable comparator is not used in queries or if resource limits prevent complete exhaustion.

🌐 Internet-Facing: HIGH - The vulnerability can be triggered by any user with query access, making internet-facing instances particularly vulnerable.
🏢 Internal Only: MEDIUM - Internal users could still trigger the vulnerability, but attack surface is reduced compared to internet-facing instances.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires ability to query buckets using the '!=' comparator, which typically requires some level of access to the MediaWiki instance.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.0.0

Vendor Advisory: https://github.com/weirdgloop/mediawiki-extensions-Bucket/security/advisories/GHSA-r9f2-4jh3-659j

Restart Required: No

Instructions:

1. Update the Bucket extension to version 1.0.0 or later. 2. For MediaWiki installations using Composer: run 'composer update weirdgloop/mediawiki-extensions-bucket'. 3. For manual installations: replace the extension files with the patched version from GitHub.

🔧 Temporary Workarounds

Disable Bucket extension

all

Temporarily disable the Bucket extension to prevent exploitation while planning upgrade.

Remove or comment out 'wfLoadExtension('Bucket');' from LocalSettings.php

Restrict query access

all

Limit user permissions to prevent use of bucket queries with '!=' comparator.

Adjust MediaWiki user rights to restrict 'bucket-query' permission

🧯 If You Can't Patch

  • Implement rate limiting on bucket queries to prevent resource exhaustion
  • Monitor PHP memory usage and call stack depth for abnormal patterns

🔍 How to Verify

Check if Vulnerable:

Check the Bucket extension version in MediaWiki's extension directory or via Composer.

Check Version:

For Composer: 'composer show weirdgloop/mediawiki-extensions-bucket'. For manual install: check the extension.json file for version number.

Verify Fix Applied:

Verify the extension version is 1.0.0 or later and test bucket queries with '!=' comparator no longer cause recursion.

📡 Detection & Monitoring

Log Indicators:

  • PHP fatal errors for maximum function nesting level exceeded
  • High memory usage spikes in PHP logs
  • Repeated bucket query failures

Network Indicators:

  • Increased response times for MediaWiki queries
  • HTTP 500 errors on bucket-related requests

SIEM Query:

source="php_error.log" AND ("Maximum function nesting level" OR "Allowed memory size") AND "Bucket"

🔗 References

📤 Share & Export