Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13008: CWE-359 Exposure of Private Personal Information to an Unauthorized Actor in M-Files Corporation M-Files Server

0
High
VulnerabilityCVE-2025-13008cvecve-2025-13008cwe-359
Published: Fri Dec 19 2025 (12/19/2025, 07:04:19 UTC)
Source: CVE Database V5
Vendor/Project: M-Files Corporation
Product: M-Files Server

Description

An information disclosure vulnerability in M-Files Server before versions 25.12.15491.7, 25.8 LTS SR3, 25.2 LTS SR3 and 24.8 LTS SR5 allows an authenticated attacker using M-Files Web to capture session tokens of other active users.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 21:00:27 UTC

Technical Analysis

CVE-2025-13008 is an information disclosure vulnerability classified under CWE-359 (Exposure of Private Personal Information to an Unauthorized Actor) affecting M-Files Server before versions 25.12.15491.7, 25.8 LTS SR3, 25.2 LTS SR3, and 24.8 LTS SR5. The flaw allows an authenticated attacker who can access the M-Files Web interface to capture session tokens belonging to other active users. Session tokens are critical for maintaining authenticated sessions; if compromised, they can be used to impersonate legitimate users without needing their credentials. The vulnerability has a CVSS v4.0 base score of 8.6, reflecting high severity due to network attack vector, low attack complexity, no privileges required beyond authentication, and the potential for high confidentiality, integrity, and availability impact. The vulnerability does not require special privileges but does require user interaction, likely involving the attacker interacting with the web interface to capture tokens. No known exploits have been reported in the wild, but the risk remains significant given the nature of session token theft. The vulnerability stems from insufficient protection of session tokens within the M-Files Web environment, potentially due to inadequate session isolation or token handling mechanisms. M-Files Server is widely used for document management in enterprises, making this vulnerability critical for organizations relying on it for secure information handling.

Potential Impact

If exploited, this vulnerability could allow attackers to hijack active user sessions by capturing their session tokens. This can lead to unauthorized access to sensitive documents and data managed by M-Files Server, potentially resulting in data breaches, intellectual property theft, and disruption of business operations. The attacker could perform actions with the same privileges as the compromised user, including viewing, modifying, or deleting documents. Given the high confidentiality, integrity, and availability impact, organizations could face regulatory penalties, reputational damage, and operational downtime. The requirement for authentication lowers the attack barrier but still poses a significant threat, especially in environments where user credentials are widely available or weakly protected. The lack of known exploits in the wild suggests limited current exploitation but also indicates the need for proactive mitigation before attackers develop weaponized exploits. Organizations with large user bases or those handling sensitive or regulated data are particularly at risk.

Mitigation Recommendations

Organizations should immediately plan to upgrade M-Files Server to the fixed versions 25.12.15491.7, 25.8 LTS SR3, 25.2 LTS SR3, or 24.8 LTS SR5 once patches are released. In the interim, restrict access to M-Files Web interfaces to trusted networks and users only, and enforce strong authentication mechanisms such as multi-factor authentication to reduce the risk of attacker authentication. Monitor active sessions for unusual activity and consider implementing session timeout policies to limit token validity periods. Employ network segmentation and web application firewalls to detect and block suspicious requests targeting session management endpoints. Educate users about phishing and social engineering risks that could facilitate attacker authentication. Review and harden session management configurations, including secure cookie flags (HttpOnly, Secure, SameSite) and token storage practices. Conduct regular audits of user sessions and logs to identify potential token theft attempts. Finally, maintain an incident response plan to quickly address any detected compromise related to session hijacking.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
M-Files Corporation
Date Reserved
2025-11-11T14:42:39.451Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6944fb8919341fe1888ac951

Added to database: 12/19/2025, 7:15:21 AM

Last enriched: 2/23/2026, 9:00:27 PM

Last updated: 3/25/2026, 3:18:02 AM

Views: 78

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses