Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14691: Cross Site Scripting in Mayan EDMS

0
Medium
VulnerabilityCVE-2025-14691cvecve-2025-14691
Published: Sun Dec 14 2025 (12/14/2025, 23:02:08 UTC)
Source: CVE Database V5
Vendor/Project: Mayan
Product: EDMS

Description

A vulnerability was detected in Mayan EDMS up to 4.10.1. The affected element is an unknown function of the file /authentication/. The manipulation results in cross site scripting. The attack may be performed from remote. The exploit is now public and may be used. Upgrading to version 4.10.2 is sufficient to fix this issue. You should upgrade the affected component. The vendor confirms that this is "[f]ixed in version 4.10.2". Furthermore, that "[b]ackports for older versions in process and will be out as soon as their respective CI pipelines complete."

AI-Powered Analysis

AILast updated: 12/21/2025, 23:36:05 UTC

Technical Analysis

CVE-2025-14691 is a Cross Site Scripting (XSS) vulnerability identified in Mayan EDMS, an open-source electronic document management system widely used for organizing and managing digital documents. The vulnerability affects versions 4.10.0 and 4.10.1 and resides in an unspecified function within the /authentication/ directory of the application. This flaw allows an attacker to inject malicious scripts that execute in the context of the victim's browser when they interact with crafted input, such as a specially crafted URL or form submission. The vulnerability is remotely exploitable without requiring any authentication, though it does require user interaction (e.g., clicking a malicious link). The impact primarily concerns the integrity of user sessions and potential execution of unauthorized scripts, which could lead to session hijacking, phishing, or defacement attacks. However, the vulnerability does not directly compromise confidentiality or availability. The vendor has addressed the issue in Mayan EDMS version 4.10.2 and is actively backporting fixes for older supported versions. No public exploits have been observed in the wild yet, but the exploit code is publicly available, increasing the risk of opportunistic attacks. The CVSS v4.0 base score is 5.3, reflecting a medium severity level due to the ease of exploitation and limited impact scope.

Potential Impact

For European organizations, the primary impact of CVE-2025-14691 lies in the potential compromise of user sessions and the integrity of document management workflows. Since Mayan EDMS is used to manage sensitive corporate and governmental documents, successful exploitation could enable attackers to execute malicious scripts that steal session cookies, perform unauthorized actions on behalf of users, or deliver phishing payloads. This could lead to unauthorized access to documents, manipulation of document metadata, or social engineering attacks targeting employees. While confidentiality and availability impacts are limited, the integrity and trustworthiness of document management systems are critical for compliance with European data protection regulations such as GDPR. Organizations relying on Mayan EDMS for regulated data processing or legal document management may face reputational damage and regulatory scrutiny if exploited. The lack of authentication requirement for exploitation increases the risk of widespread attacks, especially in environments where users are not trained to recognize phishing attempts or suspicious links.

Mitigation Recommendations

European organizations should immediately upgrade all instances of Mayan EDMS to version 4.10.2 or later to remediate this vulnerability. For environments where immediate upgrade is not feasible, applying vendor-provided backported patches for older versions as soon as they become available is essential. Additionally, organizations should implement strict input validation and output encoding on all user-supplied data within the /authentication/ module to prevent script injection. Deploying Web Application Firewalls (WAFs) with rules targeting XSS attack patterns can provide temporary protection. User awareness training should emphasize caution with unsolicited links and emails to reduce the risk of successful social engineering. Monitoring web server logs for suspicious requests targeting the /authentication/ path can help detect attempted exploitation. Finally, organizations should review session management policies to ensure secure cookie attributes (HttpOnly, Secure, SameSite) are enforced to mitigate session hijacking risks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-14T10:41:29.284Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693f461cb0f1e1d5302a462d

Added to database: 12/14/2025, 11:19:56 PM

Last enriched: 12/21/2025, 11:36:05 PM

Last updated: 2/4/2026, 9:06:57 AM

Views: 127

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats