Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13008: CWE-359 Exposure of Private Personal Information to an Unauthorized Actor in M-Files Corporation M-Files Server

0
High
VulnerabilityCVE-2025-13008cvecve-2025-13008cwe-359
Published: Fri Dec 19 2025 (12/19/2025, 07:04:19 UTC)
Source: CVE Database V5
Vendor/Project: M-Files Corporation
Product: M-Files Server

Description

An information disclosure vulnerability in M-Files Server before versions 25.12.15491.7, 25.8 LTS SR3, 25.2 LTS SR3 and 24.8 LTS SR5 allows an authenticated attacker using M-Files Web to capture session tokens of other active users.

AI-Powered Analysis

AILast updated: 01/07/2026, 19:50:38 UTC

Technical Analysis

CVE-2025-13008 is an information disclosure vulnerability classified under CWE-359 (Exposure of Private Personal Information to an Unauthorized Actor) affecting M-Files Server before versions 25.12.15491.7, 25.8 LTS SR3, 25.2 LTS SR3, and 24.8 LTS SR5. The flaw allows an authenticated attacker who has access to M-Files Web to capture session tokens belonging to other active users. Session tokens are critical for maintaining authenticated sessions; if compromised, an attacker can hijack user sessions and gain unauthorized access to sensitive documents and data managed by M-Files Server. The vulnerability does not require elevated privileges beyond authentication but does require user interaction, such as accessing the web interface. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), and user interaction required (UI:P). The impact on confidentiality, integrity, and availability is high, as session token compromise can lead to unauthorized data access and potential manipulation or disruption of services. No public exploits have been reported yet, but the vulnerability's nature makes it a significant risk if weaponized. The vulnerability affects multiple supported versions of M-Files Server, a widely used enterprise document management system, making it relevant to organizations relying on this product for secure document workflows.

Potential Impact

For European organizations, the impact of CVE-2025-13008 is substantial due to the potential for unauthorized access to sensitive corporate and personal data managed within M-Files Server environments. Confidentiality breaches could expose private personal information and intellectual property, leading to regulatory non-compliance under GDPR and other data protection laws. Integrity and availability impacts could disrupt business operations reliant on document management workflows. Attackers leveraging stolen session tokens could impersonate legitimate users, escalate privileges, or exfiltrate data without detection. This risk is heightened in sectors with stringent data security requirements such as finance, healthcare, government, and critical infrastructure. The vulnerability's exploitation could also damage organizational reputation and result in financial penalties. Given the low complexity of exploitation and the widespread use of M-Files in Europe, the threat poses a meaningful risk to enterprise environments if patches are not applied promptly.

Mitigation Recommendations

1. Immediately apply the security updates provided by M-Files Corporation for versions 25.12.15491.7, 25.8 LTS SR3, 25.2 LTS SR3, and 24.8 LTS SR5 or later to remediate the vulnerability. 2. Enforce strict session management policies, including short session timeouts and automatic invalidation of sessions after logout or inactivity. 3. Implement multi-factor authentication (MFA) for all M-Files Web access to reduce the risk of session hijacking. 4. Monitor and audit session token usage and access logs for unusual patterns indicative of token theft or session hijacking attempts. 5. Restrict access to M-Files Web interfaces via network segmentation and IP whitelisting where feasible. 6. Educate users about phishing and social engineering risks that could facilitate session token compromise. 7. Employ web application firewalls (WAFs) with rules tuned to detect anomalous session token activities. 8. Regularly review and update access controls and permissions within M-Files to minimize exposure. These steps go beyond generic advice by focusing on session security hardening and proactive monitoring tailored to this vulnerability's exploitation vector.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
M-Files Corporation
Date Reserved
2025-11-11T14:42:39.451Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6944fb8919341fe1888ac951

Added to database: 12/19/2025, 7:15:21 AM

Last enriched: 1/7/2026, 7:50:38 PM

Last updated: 2/7/2026, 9:33:12 AM

Views: 59

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats