Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14692: Open Redirect in Mayan EDMS

0
Medium
VulnerabilityCVE-2025-14692cvecve-2025-14692
Published: Sun Dec 14 2025 (12/14/2025, 23:32:09 UTC)
Source: CVE Database V5
Vendor/Project: Mayan
Product: EDMS

Description

A flaw has been found in Mayan EDMS up to 4.10.1. The impacted element is an unknown function of the file /authentication/. This manipulation causes open redirect. It is possible to initiate the attack remotely. The exploit has been published and may be used. Upgrading to version 4.10.2 is sufficient to resolve this issue. The affected component should be upgraded. The vendor confirms that this is "[f]ixed in version 4.10.2". Furthermore, that "[b]ackports for older versions in process and will be out as soon as their respective CI pipelines complete."

AI-Powered Analysis

AILast updated: 12/15/2025, 00:04:56 UTC

Technical Analysis

CVE-2025-14692 is an open redirect vulnerability affecting Mayan EDMS, an open-source electronic document management system widely used for managing and storing documents securely. The flaw exists in an unspecified function within the /authentication/ path, allowing an attacker to craft URLs that redirect users to arbitrary external sites. This vulnerability can be exploited remotely without authentication, requiring only that a user clicks a malicious link. The open redirect can be leveraged in phishing campaigns to trick users into visiting malicious websites, potentially leading to credential theft, malware infection, or further social engineering attacks. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:P), and limited impact on integrity (VI:L) with no impact on confidentiality or availability. The vendor has addressed the issue in version 4.10.2 and is preparing backports for older supported versions. Although no active exploitation has been reported, the public availability of an exploit increases the urgency for patching. The vulnerability highlights the importance of validating and sanitizing redirect URLs in authentication workflows to prevent abuse.

Potential Impact

For European organizations, the open redirect vulnerability poses a significant risk primarily through phishing and social engineering attacks. Attackers can exploit this flaw to redirect users to malicious websites that may harvest credentials or deliver malware, undermining user trust and potentially leading to unauthorized access to sensitive documents managed by Mayan EDMS. Given the critical role of document management systems in compliance-heavy sectors such as finance, healthcare, and government, exploitation could result in data breaches, regulatory penalties under GDPR, and reputational damage. The medium CVSS score reflects moderate impact but the ease of exploitation and lack of required privileges increase the threat surface. Organizations relying on Mayan EDMS for secure document workflows may face increased risk of targeted attacks, especially if users are not trained to recognize suspicious links. The vulnerability does not directly compromise system integrity or availability but serves as an effective vector for broader attacks.

Mitigation Recommendations

European organizations should immediately upgrade all Mayan EDMS installations to version 4.10.2 or later to remediate the vulnerability. For environments where immediate upgrade is not feasible, implement strict URL validation and filtering on the authentication redirect parameters to block untrusted or external URLs. Employ web application firewalls (WAFs) with custom rules to detect and block open redirect attempts targeting Mayan EDMS endpoints. Enhance user awareness training focusing on phishing risks associated with URL redirection and encourage verification of URLs before clicking. Monitor logs for unusual redirect patterns or spikes in authentication-related requests. Coordinate with IT security teams to conduct penetration testing and vulnerability scanning specifically targeting open redirect vectors. Finally, stay informed about backported patches from the vendor and apply them promptly to maintain security across all supported versions.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-14T10:41:33.237Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693f4d23b0f1e1d5302caa57

Added to database: 12/14/2025, 11:49:55 PM

Last enriched: 12/15/2025, 12:04:56 AM

Last updated: 12/15/2025, 5:49:00 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats