CVE-2024-6789: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in M-Files Corporation M-Files Server
A path traversal issue in API endpoint in M-Files Server before version 24.8.13981.0 and LTS 24.2.13421.15 SR2 and LTS 23.8.12892.0 SR6 allows authenticated user to read files
AI Analysis
Technical Summary
CVE-2024-6789 is a path traversal vulnerability classified under CWE-22 affecting M-Files Server, a document management system widely used in enterprise environments. The flaw exists in an API endpoint that fails to properly restrict pathname inputs, allowing an authenticated user with low privileges to traverse directories and read files outside the intended restricted directory. This can lead to unauthorized disclosure of sensitive files stored on the server, potentially exposing confidential business information or credentials. The vulnerability affects versions before 24.8.13981.0 and specific long-term support (LTS) versions 24.2.13421.15 SR2 and 23.8.12892.0 SR6. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and high confidentiality impact (VC:H), with no impact on integrity or availability. The scope is high, meaning the vulnerability affects components beyond the initially vulnerable component. Although no public exploits have been reported, the ease of exploitation combined with the high confidentiality impact makes this a critical concern for organizations relying on M-Files Server for secure document management. The vulnerability was publicly disclosed on August 27, 2024, and no official patches or mitigation links were provided at the time of reporting, increasing urgency for organizations to monitor vendor updates and implement compensating controls.
Potential Impact
The primary impact of CVE-2024-6789 is unauthorized disclosure of sensitive information due to arbitrary file read capabilities. Attackers who gain authenticated access—even with low privileges—can exploit this vulnerability to access confidential documents, configuration files, or credentials stored on the M-Files Server. This can lead to data breaches, intellectual property theft, and potential escalation of attacks if sensitive credentials or configuration data are exposed. The vulnerability does not directly affect system integrity or availability but compromises confidentiality severely. Organizations handling regulated data (e.g., financial, healthcare, legal) face compliance risks and reputational damage if exploited. The ease of exploitation over the network without user interaction increases the likelihood of targeted attacks, especially in environments where M-Files Server is exposed to internal or external networks. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as proof-of-concept exploits could emerge rapidly.
Mitigation Recommendations
1. Apply official patches from M-Files Corporation immediately once available for all affected versions, including LTS releases. 2. Restrict access to the M-Files Server API endpoints to trusted internal networks and authenticated users only, using network segmentation and firewall rules. 3. Implement strict access controls and least privilege principles for user accounts with access to M-Files Server, minimizing the number of users with authenticated access. 4. Monitor server logs for unusual file access patterns or API requests that attempt directory traversal sequences (e.g., '../'). 5. Use web application firewalls (WAFs) with custom rules to detect and block path traversal attempts targeting the API endpoints. 6. Conduct regular security audits and penetration tests focusing on file access controls within M-Files Server. 7. Educate administrators and users about the risks of exposing document management systems and enforce strong authentication mechanisms such as multifactor authentication (MFA). 8. Until patches are applied, consider disabling or limiting API functionality that handles file paths if feasible without disrupting business operations.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, Sweden, Finland, Netherlands, France, Japan, South Korea
CVE-2024-6789: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in M-Files Corporation M-Files Server
Description
A path traversal issue in API endpoint in M-Files Server before version 24.8.13981.0 and LTS 24.2.13421.15 SR2 and LTS 23.8.12892.0 SR6 allows authenticated user to read files
AI-Powered Analysis
Technical Analysis
CVE-2024-6789 is a path traversal vulnerability classified under CWE-22 affecting M-Files Server, a document management system widely used in enterprise environments. The flaw exists in an API endpoint that fails to properly restrict pathname inputs, allowing an authenticated user with low privileges to traverse directories and read files outside the intended restricted directory. This can lead to unauthorized disclosure of sensitive files stored on the server, potentially exposing confidential business information or credentials. The vulnerability affects versions before 24.8.13981.0 and specific long-term support (LTS) versions 24.2.13421.15 SR2 and 23.8.12892.0 SR6. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and high confidentiality impact (VC:H), with no impact on integrity or availability. The scope is high, meaning the vulnerability affects components beyond the initially vulnerable component. Although no public exploits have been reported, the ease of exploitation combined with the high confidentiality impact makes this a critical concern for organizations relying on M-Files Server for secure document management. The vulnerability was publicly disclosed on August 27, 2024, and no official patches or mitigation links were provided at the time of reporting, increasing urgency for organizations to monitor vendor updates and implement compensating controls.
Potential Impact
The primary impact of CVE-2024-6789 is unauthorized disclosure of sensitive information due to arbitrary file read capabilities. Attackers who gain authenticated access—even with low privileges—can exploit this vulnerability to access confidential documents, configuration files, or credentials stored on the M-Files Server. This can lead to data breaches, intellectual property theft, and potential escalation of attacks if sensitive credentials or configuration data are exposed. The vulnerability does not directly affect system integrity or availability but compromises confidentiality severely. Organizations handling regulated data (e.g., financial, healthcare, legal) face compliance risks and reputational damage if exploited. The ease of exploitation over the network without user interaction increases the likelihood of targeted attacks, especially in environments where M-Files Server is exposed to internal or external networks. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as proof-of-concept exploits could emerge rapidly.
Mitigation Recommendations
1. Apply official patches from M-Files Corporation immediately once available for all affected versions, including LTS releases. 2. Restrict access to the M-Files Server API endpoints to trusted internal networks and authenticated users only, using network segmentation and firewall rules. 3. Implement strict access controls and least privilege principles for user accounts with access to M-Files Server, minimizing the number of users with authenticated access. 4. Monitor server logs for unusual file access patterns or API requests that attempt directory traversal sequences (e.g., '../'). 5. Use web application firewalls (WAFs) with custom rules to detect and block path traversal attempts targeting the API endpoints. 6. Conduct regular security audits and penetration tests focusing on file access controls within M-Files Server. 7. Educate administrators and users about the risks of exposing document management systems and enforce strong authentication mechanisms such as multifactor authentication (MFA). 8. Until patches are applied, consider disabling or limiting API functionality that handles file paths if feasible without disrupting business operations.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- M-Files Corporation
- Date Reserved
- 2024-07-16T12:19:08.442Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 699c3035be58cf853b75f10f
Added to database: 2/23/2026, 10:47:17 AM
Last enriched: 2/23/2026, 11:01:49 AM
Last updated: 2/24/2026, 4:39:29 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-3069: SQL Injection in itsourcecode Document Management System
MediumCVE-2026-3068: SQL Injection in itsourcecode Document Management System
MediumCVE-2026-3067: Path Traversal in HummerRisk
MediumCVE-2026-3066: Command Injection in HummerRisk
MediumCVE-2026-3091: Uncontrolled Search Path Element in Synology Synology Presto Client
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.