CVE-2025-14691: Cross Site Scripting in Mayan EDMS
A vulnerability was detected in Mayan EDMS up to 4.10.1. The affected element is an unknown function of the file /authentication/. The manipulation results in cross site scripting. The attack may be performed from remote. The exploit is now public and may be used. Upgrading to version 4.10.2 is sufficient to fix this issue. You should upgrade the affected component. The vendor confirms that this is "[f]ixed in version 4.10.2". Furthermore, that "[b]ackports for older versions in process and will be out as soon as their respective CI pipelines complete."
AI Analysis
Technical Summary
CVE-2025-14691 is a cross-site scripting vulnerability identified in the Mayan EDMS document management system, specifically affecting versions 4.10.0 and 4.10.1. The vulnerability arises from improper input sanitization or output encoding in an unknown function within the /authentication/ directory, which allows an attacker to inject malicious JavaScript code remotely. This XSS flaw can be exploited without any authentication, making it accessible to unauthenticated remote attackers. However, exploitation requires user interaction, such as a victim clicking on a maliciously crafted URL or interacting with manipulated content. The impact of this vulnerability includes potential session hijacking, theft of authentication tokens, or execution of arbitrary scripts in the context of the victim’s browser, which can lead to phishing or unauthorized actions within the EDMS interface. The vendor has addressed the vulnerability in version 4.10.2 and is working on backporting fixes to older supported versions. Although no active exploits have been observed in the wild, the availability of public exploit code increases the risk of opportunistic attacks. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required, user interaction needed, and limited impact on confidentiality and integrity, with no impact on availability or scope changes. This vulnerability highlights the importance of secure input validation and output encoding in web applications, especially those handling sensitive document management workflows.
Potential Impact
For European organizations, the impact of CVE-2025-14691 can be significant in environments where Mayan EDMS is used to manage sensitive or regulated documents. Successful exploitation could lead to session hijacking, allowing attackers to impersonate legitimate users and access confidential documents or perform unauthorized actions. This undermines confidentiality and integrity of document workflows, potentially exposing sensitive business or personal data. Although availability is not directly affected, the reputational damage and compliance risks (e.g., GDPR violations) from data leakage or unauthorized access could be substantial. Public sector entities, legal firms, and financial institutions in Europe relying on Mayan EDMS for document management are particularly at risk. The medium severity rating suggests that while the vulnerability is not critical, it poses a meaningful threat that could be leveraged in targeted phishing campaigns or lateral movement within networks. The lack of authentication requirement lowers the barrier for attackers, increasing the likelihood of exploitation if patches are not applied promptly.
Mitigation Recommendations
European organizations should immediately upgrade all Mayan EDMS instances to version 4.10.2 or later to remediate CVE-2025-14691. For environments where immediate upgrading is not feasible, apply any available vendor backported patches as soon as they are released. Implement strict Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of potential XSS attacks. Conduct thorough input validation and output encoding reviews for any custom plugins or integrations with Mayan EDMS to prevent similar vulnerabilities. Educate users about the risks of clicking on suspicious links and implement email filtering to reduce phishing attempts leveraging this vulnerability. Monitor web server and application logs for unusual requests targeting the /authentication/ path or signs of XSS exploitation attempts. Employ web application firewalls (WAFs) with rules designed to detect and block XSS payloads targeting Mayan EDMS. Finally, integrate vulnerability management processes to ensure timely patching of document management systems and related infrastructure.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Italy
CVE-2025-14691: Cross Site Scripting in Mayan EDMS
Description
A vulnerability was detected in Mayan EDMS up to 4.10.1. The affected element is an unknown function of the file /authentication/. The manipulation results in cross site scripting. The attack may be performed from remote. The exploit is now public and may be used. Upgrading to version 4.10.2 is sufficient to fix this issue. You should upgrade the affected component. The vendor confirms that this is "[f]ixed in version 4.10.2". Furthermore, that "[b]ackports for older versions in process and will be out as soon as their respective CI pipelines complete."
AI-Powered Analysis
Technical Analysis
CVE-2025-14691 is a cross-site scripting vulnerability identified in the Mayan EDMS document management system, specifically affecting versions 4.10.0 and 4.10.1. The vulnerability arises from improper input sanitization or output encoding in an unknown function within the /authentication/ directory, which allows an attacker to inject malicious JavaScript code remotely. This XSS flaw can be exploited without any authentication, making it accessible to unauthenticated remote attackers. However, exploitation requires user interaction, such as a victim clicking on a maliciously crafted URL or interacting with manipulated content. The impact of this vulnerability includes potential session hijacking, theft of authentication tokens, or execution of arbitrary scripts in the context of the victim’s browser, which can lead to phishing or unauthorized actions within the EDMS interface. The vendor has addressed the vulnerability in version 4.10.2 and is working on backporting fixes to older supported versions. Although no active exploits have been observed in the wild, the availability of public exploit code increases the risk of opportunistic attacks. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required, user interaction needed, and limited impact on confidentiality and integrity, with no impact on availability or scope changes. This vulnerability highlights the importance of secure input validation and output encoding in web applications, especially those handling sensitive document management workflows.
Potential Impact
For European organizations, the impact of CVE-2025-14691 can be significant in environments where Mayan EDMS is used to manage sensitive or regulated documents. Successful exploitation could lead to session hijacking, allowing attackers to impersonate legitimate users and access confidential documents or perform unauthorized actions. This undermines confidentiality and integrity of document workflows, potentially exposing sensitive business or personal data. Although availability is not directly affected, the reputational damage and compliance risks (e.g., GDPR violations) from data leakage or unauthorized access could be substantial. Public sector entities, legal firms, and financial institutions in Europe relying on Mayan EDMS for document management are particularly at risk. The medium severity rating suggests that while the vulnerability is not critical, it poses a meaningful threat that could be leveraged in targeted phishing campaigns or lateral movement within networks. The lack of authentication requirement lowers the barrier for attackers, increasing the likelihood of exploitation if patches are not applied promptly.
Mitigation Recommendations
European organizations should immediately upgrade all Mayan EDMS instances to version 4.10.2 or later to remediate CVE-2025-14691. For environments where immediate upgrading is not feasible, apply any available vendor backported patches as soon as they are released. Implement strict Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of potential XSS attacks. Conduct thorough input validation and output encoding reviews for any custom plugins or integrations with Mayan EDMS to prevent similar vulnerabilities. Educate users about the risks of clicking on suspicious links and implement email filtering to reduce phishing attempts leveraging this vulnerability. Monitor web server and application logs for unusual requests targeting the /authentication/ path or signs of XSS exploitation attempts. Employ web application firewalls (WAFs) with rules designed to detect and block XSS payloads targeting Mayan EDMS. Finally, integrate vulnerability management processes to ensure timely patching of document management systems and related infrastructure.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-14T10:41:29.284Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 693f461cb0f1e1d5302a462d
Added to database: 12/14/2025, 11:19:56 PM
Last enriched: 12/14/2025, 11:34:56 PM
Last updated: 12/15/2025, 5:50:18 AM
Views: 11
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14712: CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere in JHENG GAO Student Learning Assessment and Support System
HighCVE-2025-14706: Command Injection in Shiguangwu sgwbox N3
CriticalCVE-2025-14705: Command Injection in Shiguangwu sgwbox N3
CriticalCVE-2025-14704: Path Traversal in Shiguangwu sgwbox N3
MediumCVE-2025-14703: Improper Authentication in Shiguangwu sgwbox N3
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.