CVE-2025-61653
Description
Vulnerability in Wikimedia Foundation TextExtracts. This vulnerability is associated with program files includes/ApiQueryExtracts.Php.
This issue affects TextExtracts: from * before 1.39.14, 1.43.4, 1.44.1.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A low-severity vulnerability in Wikimedia TextExtracts allows potential information disclosure via improper handling in ApiQueryExtracts.php.
Vulnerability
Overview
CVE- CVE-2025-61653 is a low-severity vulnerability in the Wikimedia Foundation's TextExtracts extension. The issue resides in the includes/ApiQueryExtracts.php file, where improper handling may lead to unintended information disclosure. The vulnerability affects TextExtracts versions before 1.39.14, 1.43.4, and 1.44.1 [1].
Exploitation and
Impact
- The attack surface is limited, as the vulnerability requires specific conditions to be exploitable. An attacker would need to interact with the API endpoint that uses the affected code. The impact is considered low, as the potential information disclosure is likely limited to non-sensitive data or metadata. No authentication bypass or remote code execution is involved [1].
Mitigation
- The vulnerability has been patched in TextExtracts versions 1.39.14, 1.43.4, and 1.44.1. Users are advised to update to these or later versions to mitigate the risk. No workarounds have been provided, but the low severity suggests minimal immediate threat [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: before 1.39.14, 1.43.4, 1.44.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.