CVE-2025-14691: Cross Site Scripting in Mayan EDMS
A vulnerability was detected in Mayan EDMS up to 4.10.1. The affected element is an unknown function of the file /authentication/. The manipulation results in cross site scripting. The attack may be performed from remote. The exploit is now public and may be used. Upgrading to version 4.10.2 is sufficient to fix this issue. You should upgrade the affected component. The vendor confirms that this is "[f]ixed in version 4.10.2". Furthermore, that "[b]ackports for older versions in process and will be out as soon as their respective CI pipelines complete."
AI Analysis
Technical Summary
CVE-2025-14691 is a Cross Site Scripting (XSS) vulnerability identified in Mayan EDMS, an open-source electronic document management system widely used for organizing and managing digital documents. The vulnerability affects versions 4.10.0 and 4.10.1 and resides in an unspecified function within the /authentication/ directory of the application. This flaw allows an attacker to inject malicious scripts that execute in the context of the victim's browser when they interact with crafted input, such as a specially crafted URL or form submission. The vulnerability is remotely exploitable without requiring any authentication, though it does require user interaction (e.g., clicking a malicious link). The impact primarily concerns the integrity of user sessions and potential execution of unauthorized scripts, which could lead to session hijacking, phishing, or defacement attacks. However, the vulnerability does not directly compromise confidentiality or availability. The vendor has addressed the issue in Mayan EDMS version 4.10.2 and is actively backporting fixes for older supported versions. No public exploits have been observed in the wild yet, but the exploit code is publicly available, increasing the risk of opportunistic attacks. The CVSS v4.0 base score is 5.3, reflecting a medium severity level due to the ease of exploitation and limited impact scope.
Potential Impact
For European organizations, the primary impact of CVE-2025-14691 lies in the potential compromise of user sessions and the integrity of document management workflows. Since Mayan EDMS is used to manage sensitive corporate and governmental documents, successful exploitation could enable attackers to execute malicious scripts that steal session cookies, perform unauthorized actions on behalf of users, or deliver phishing payloads. This could lead to unauthorized access to documents, manipulation of document metadata, or social engineering attacks targeting employees. While confidentiality and availability impacts are limited, the integrity and trustworthiness of document management systems are critical for compliance with European data protection regulations such as GDPR. Organizations relying on Mayan EDMS for regulated data processing or legal document management may face reputational damage and regulatory scrutiny if exploited. The lack of authentication requirement for exploitation increases the risk of widespread attacks, especially in environments where users are not trained to recognize phishing attempts or suspicious links.
Mitigation Recommendations
European organizations should immediately upgrade all instances of Mayan EDMS to version 4.10.2 or later to remediate this vulnerability. For environments where immediate upgrade is not feasible, applying vendor-provided backported patches for older versions as soon as they become available is essential. Additionally, organizations should implement strict input validation and output encoding on all user-supplied data within the /authentication/ module to prevent script injection. Deploying Web Application Firewalls (WAFs) with rules targeting XSS attack patterns can provide temporary protection. User awareness training should emphasize caution with unsolicited links and emails to reduce the risk of successful social engineering. Monitoring web server logs for suspicious requests targeting the /authentication/ path can help detect attempted exploitation. Finally, organizations should review session management policies to ensure secure cookie attributes (HttpOnly, Secure, SameSite) are enforced to mitigate session hijacking risks.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Italy
CVE-2025-14691: Cross Site Scripting in Mayan EDMS
Description
A vulnerability was detected in Mayan EDMS up to 4.10.1. The affected element is an unknown function of the file /authentication/. The manipulation results in cross site scripting. The attack may be performed from remote. The exploit is now public and may be used. Upgrading to version 4.10.2 is sufficient to fix this issue. You should upgrade the affected component. The vendor confirms that this is "[f]ixed in version 4.10.2". Furthermore, that "[b]ackports for older versions in process and will be out as soon as their respective CI pipelines complete."
AI-Powered Analysis
Technical Analysis
CVE-2025-14691 is a Cross Site Scripting (XSS) vulnerability identified in Mayan EDMS, an open-source electronic document management system widely used for organizing and managing digital documents. The vulnerability affects versions 4.10.0 and 4.10.1 and resides in an unspecified function within the /authentication/ directory of the application. This flaw allows an attacker to inject malicious scripts that execute in the context of the victim's browser when they interact with crafted input, such as a specially crafted URL or form submission. The vulnerability is remotely exploitable without requiring any authentication, though it does require user interaction (e.g., clicking a malicious link). The impact primarily concerns the integrity of user sessions and potential execution of unauthorized scripts, which could lead to session hijacking, phishing, or defacement attacks. However, the vulnerability does not directly compromise confidentiality or availability. The vendor has addressed the issue in Mayan EDMS version 4.10.2 and is actively backporting fixes for older supported versions. No public exploits have been observed in the wild yet, but the exploit code is publicly available, increasing the risk of opportunistic attacks. The CVSS v4.0 base score is 5.3, reflecting a medium severity level due to the ease of exploitation and limited impact scope.
Potential Impact
For European organizations, the primary impact of CVE-2025-14691 lies in the potential compromise of user sessions and the integrity of document management workflows. Since Mayan EDMS is used to manage sensitive corporate and governmental documents, successful exploitation could enable attackers to execute malicious scripts that steal session cookies, perform unauthorized actions on behalf of users, or deliver phishing payloads. This could lead to unauthorized access to documents, manipulation of document metadata, or social engineering attacks targeting employees. While confidentiality and availability impacts are limited, the integrity and trustworthiness of document management systems are critical for compliance with European data protection regulations such as GDPR. Organizations relying on Mayan EDMS for regulated data processing or legal document management may face reputational damage and regulatory scrutiny if exploited. The lack of authentication requirement for exploitation increases the risk of widespread attacks, especially in environments where users are not trained to recognize phishing attempts or suspicious links.
Mitigation Recommendations
European organizations should immediately upgrade all instances of Mayan EDMS to version 4.10.2 or later to remediate this vulnerability. For environments where immediate upgrade is not feasible, applying vendor-provided backported patches for older versions as soon as they become available is essential. Additionally, organizations should implement strict input validation and output encoding on all user-supplied data within the /authentication/ module to prevent script injection. Deploying Web Application Firewalls (WAFs) with rules targeting XSS attack patterns can provide temporary protection. User awareness training should emphasize caution with unsolicited links and emails to reduce the risk of successful social engineering. Monitoring web server logs for suspicious requests targeting the /authentication/ path can help detect attempted exploitation. Finally, organizations should review session management policies to ensure secure cookie attributes (HttpOnly, Secure, SameSite) are enforced to mitigate session hijacking risks.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-14T10:41:29.284Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 693f461cb0f1e1d5302a462d
Added to database: 12/14/2025, 11:19:56 PM
Last enriched: 12/21/2025, 11:36:05 PM
Last updated: 2/4/2026, 9:06:57 AM
Views: 127
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1370: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in comprassibs SIBS woocommerce payment gateway
MediumCVE-2026-0816: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in gtlwpdev All push notification for WP
MediumCVE-2026-0743: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in orenhav WP Content Permission
MediumCVE-2026-0742: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in zealopensource Smart Appointment & Booking
MediumCVE-2026-0681: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in rtddev Extended Random Number Generator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.