Debian dsa-6085 : mediawiki - security update

medium Nessus Plugin ID 279440

Synopsis

The remote Debian host is missing one or more security-related updates.

Description

The remote Debian 12 / 13 host has packages installed that are affected by multiple vulnerabilities as referenced in the dsa-6085 advisory.

- ------------------------------------------------------------------------- Debian Security Advisory DSA-6085-1 [email protected] https://www.debian.org/security/ Moritz Muehlenhoff December 19, 2025 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : mediawiki CVE ID : CVE-2025-11173 CVE-2025-11261 CVE-2025-61635 CVE-2025-61638 CVE-2025-61639 CVE-2025-61640 CVE-2025-61641 CVE-2025-61643 CVE-2025-61646 CVE-2025-61653 CVE-2025-61655 CVE-2025-61656 CVE-2025-67475 CVE-2025-67478 CVE-2025-67479 CVE-2025-67480 CVE-2025-67481 CVE-2025-67482 CVE-2025-67484 CVE-2025-67483 CVE-2025-67477 CVE-2025-61657 CVE-2025-61654 CVE-2025-61652 CVE-2025-61642 CVE-2025-61637 CVE-2025-61636 CVE-2025-61634 CVE-2025-11175

Multiple security issues were discovered in MediaWiki, a website engine for collaborative work, which could result in cross-site scripting, information disclosure, missing rate limiting or denial of service.

For the oldstable distribution (bookworm), these problems have been fixed in version 1:1.39.17-1~deb12u1.

For the stable distribution (trixie), these problems have been fixed in version 1:1.43.6+dfsg-1~deb13u1.

We recommend that you upgrade your mediawiki packages.

For the detailed security status of mediawiki please refer to its security tracker page at:
https://security-tracker.debian.org/tracker/mediawiki

Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/

Mailing list: [email protected]

Tenable has extracted the preceding description block directly from the Debian security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade the mediawiki packages.

See Also

https://security-tracker.debian.org/tracker/source-package/mediawiki

https://security-tracker.debian.org/tracker/CVE-2025-11173

https://security-tracker.debian.org/tracker/CVE-2025-11175

https://security-tracker.debian.org/tracker/CVE-2025-11261

https://security-tracker.debian.org/tracker/CVE-2025-61634

https://security-tracker.debian.org/tracker/CVE-2025-61635

https://security-tracker.debian.org/tracker/CVE-2025-61636

https://security-tracker.debian.org/tracker/CVE-2025-61637

https://security-tracker.debian.org/tracker/CVE-2025-61638

https://security-tracker.debian.org/tracker/CVE-2025-61639

https://security-tracker.debian.org/tracker/CVE-2025-61640

https://security-tracker.debian.org/tracker/CVE-2025-61641

https://security-tracker.debian.org/tracker/CVE-2025-61642

https://security-tracker.debian.org/tracker/CVE-2025-61643

https://security-tracker.debian.org/tracker/CVE-2025-61646

https://security-tracker.debian.org/tracker/CVE-2025-61652

https://security-tracker.debian.org/tracker/CVE-2025-61653

https://security-tracker.debian.org/tracker/CVE-2025-61654

https://security-tracker.debian.org/tracker/CVE-2025-61655

https://security-tracker.debian.org/tracker/CVE-2025-61656

https://security-tracker.debian.org/tracker/CVE-2025-61657

https://security-tracker.debian.org/tracker/CVE-2025-67475

https://security-tracker.debian.org/tracker/CVE-2025-67477

https://security-tracker.debian.org/tracker/CVE-2025-67478

https://security-tracker.debian.org/tracker/CVE-2025-67479

https://security-tracker.debian.org/tracker/CVE-2025-67480

https://security-tracker.debian.org/tracker/CVE-2025-67481

https://security-tracker.debian.org/tracker/CVE-2025-67482

https://security-tracker.debian.org/tracker/CVE-2025-67483

https://security-tracker.debian.org/tracker/CVE-2025-67484

https://packages.debian.org/source/bookworm/mediawiki

https://packages.debian.org/source/trixie/mediawiki

Plugin Details

Severity: Medium

ID: 279440

File Name: debian_DSA-6085.nasl

Version: 1.1

Type: local

Agent: unix

Published: 12/19/2025

Updated: 12/19/2025

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Low

Base Score: 3.5

Temporal Score: 2.6

Vector: CVSS2#AV:N/AC:M/Au:S/C:N/I:P/A:N

CVSS Score Source: CVE-2025-61656

CVSS v3

Risk Factor: Medium

Base Score: 5.4

Temporal Score: 4.7

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:mediawiki, p-cpe:/a:debian:debian_linux:mediawiki-classes, cpe:/o:debian:debian_linux:13.0, cpe:/o:debian:debian_linux:12.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 12/19/2025

Vulnerability Publication Date: 12/19/2025

Reference Information

CVE: CVE-2025-11173, CVE-2025-11175, CVE-2025-11261, CVE-2025-61634, CVE-2025-61635, CVE-2025-61636, CVE-2025-61637, CVE-2025-61638, CVE-2025-61639, CVE-2025-61640, CVE-2025-61641, CVE-2025-61642, CVE-2025-61643, CVE-2025-61646, CVE-2025-61652, CVE-2025-61653, CVE-2025-61654, CVE-2025-61655, CVE-2025-61656, CVE-2025-61657, CVE-2025-67475, CVE-2025-67477, CVE-2025-67478, CVE-2025-67479, CVE-2025-67480, CVE-2025-67481, CVE-2025-67482, CVE-2025-67483, CVE-2025-67484