CVE-2025-67646

3.5 LOW

📋 TL;DR

This CVE describes a Cross-Site Request Forgery (CSRF) vulnerability in the TableProgressTracking MediaWiki extension. Attackers can craft malicious webpages that, when visited by authenticated users, trigger unauthorized actions like deleting or tracking progress against tables. This affects all MediaWiki installations with TableProgressTracking extension versions 1.2.0 and below enabled.

💻 Affected Systems

Products:
  • TableProgressTracking MediaWiki extension
Versions: 1.2.0 and below
Operating Systems: All operating systems running MediaWiki
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects MediaWiki installations with the TableProgressTracking extension enabled and configured.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Authenticated users could have their table progress data deleted or manipulated without their knowledge, potentially disrupting workflow tracking and data integrity.

🟠

Likely Case

Attackers could manipulate table progress tracking data, causing confusion or data corruption in collaborative wiki environments.

🟢

If Mitigated

With proper CSRF token validation, all unauthorized requests would be rejected, preventing exploitation.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires an authenticated user to visit a malicious webpage while logged into the vulnerable MediaWiki instance.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.2.1

Vendor Advisory: https://github.com/Telepedia/TableProgressTracking/security/advisories/GHSA-j24f-hw6w-cq78

Restart Required: No

Instructions:

1. Update TableProgressTracking extension to version 1.2.1 or later. 2. Verify the update by checking extension version in MediaWiki. 3. No MediaWiki restart required.

🔧 Temporary Workarounds

Disable TableProgressTracking extension

all

Temporarily disable the vulnerable extension until patching is possible

Edit LocalSettings.php and remove or comment out wfLoadExtension('TableProgressTracking');

🧯 If You Can't Patch

  • Implement web application firewall rules to block suspicious REST API requests
  • Educate users about CSRF risks and safe browsing practices

🔍 How to Verify

Check if Vulnerable:

Check MediaWiki's extensions directory for TableProgressTracking version. If version is 1.2.0 or below, the system is vulnerable.

Check Version:

Check MediaWiki's LocalSettings.php or extension directory for TableProgressTracking version information.

Verify Fix Applied:

Verify TableProgressTracking extension version is 1.2.1 or higher in MediaWiki extension manager.

📡 Detection & Monitoring

Log Indicators:

  • Unusual REST API requests to TableProgressTracking endpoints without CSRF tokens
  • Multiple table progress modifications from same user in short timeframe

Network Indicators:

  • HTTP POST requests to TableProgressTracking REST endpoints without proper referrer headers or CSRF tokens

SIEM Query:

source="mediawiki.log" AND "TableProgressTracking" AND ("DELETE" OR "POST") AND NOT "csrf_token"

🔗 References

📤 Share & Export