Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-2091: CWE-601 URL Redirection to Untrusted Site ('Open Redirect') in M-Files Corporation M-Files Mobile

0
Medium
VulnerabilityCVE-2025-2091cvecve-2025-2091cwe-601
Published: Mon Jun 16 2025 (06/16/2025, 08:27:13 UTC)
Source: CVE Database V5
Vendor/Project: M-Files Corporation
Product: M-Files Mobile

Description

An open redirection vulnerability in M-Files mobile applications for Android and iOS prior to version 25.6.0 allows attackers to use maliciously crafted PDF files to trick other users into making requests to untrusted URLs.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 21:00:58 UTC

Technical Analysis

CVE-2025-2091 is an open redirect vulnerability classified under CWE-601 found in M-Files Mobile applications for Android and iOS prior to version 25.6.0. Open redirection occurs when an application accepts untrusted input that causes it to redirect users to external, potentially malicious websites. In this case, attackers can embed maliciously crafted PDF files that exploit the vulnerability by causing the M-Files Mobile app to redirect users to attacker-controlled URLs. This redirection can be used for phishing attacks, social engineering, or to deliver malware payloads by leveraging the trust users place in the M-Files Mobile app environment. The vulnerability does not require authentication but does require user interaction (opening the malicious PDF). The CVSS 4.8 score indicates a medium severity, reflecting that while the vulnerability can be exploited remotely without privileges, the impact on confidentiality, integrity, and availability is limited primarily to user deception and potential indirect compromise. No public exploits have been reported to date. The vulnerability was reserved in March 2025 and published in June 2025. M-Files Corporation has addressed this issue in version 25.6.0 of their mobile app, though no direct patch links are provided in the source data.

Potential Impact

The primary impact of this vulnerability is on user trust and potential exposure to phishing or malware delivery through trusted enterprise applications. Organizations using M-Files Mobile risk their users being redirected to malicious sites, which could lead to credential theft, unauthorized access, or further compromise of enterprise systems if users are tricked into divulging sensitive information or downloading malware. While the vulnerability does not directly compromise the M-Files Mobile app’s confidentiality or integrity, the indirect effects can be significant, especially in environments where M-Files is used for sensitive document management. The requirement for user interaction limits automated exploitation but does not eliminate risk, particularly in targeted attacks or spear-phishing campaigns. This vulnerability could affect industries relying heavily on M-Files Mobile for document workflows, including finance, healthcare, legal, and government sectors.

Mitigation Recommendations

Organizations should immediately upgrade M-Files Mobile applications on all Android and iOS devices to version 25.6.0 or later, where the vulnerability is fixed. Additionally, implement strict email and document scanning policies to detect and block malicious PDFs before they reach end users. User awareness training should emphasize caution when opening PDFs from untrusted or unexpected sources, especially within enterprise mobile environments. Consider deploying mobile threat defense (MTD) solutions that can detect suspicious redirection behaviors or block access to known malicious URLs. Where possible, configure M-Files Mobile and associated systems to restrict or validate URLs before redirection occurs. Monitoring and logging user access patterns for unusual redirection events can help detect exploitation attempts. Finally, coordinate with M-Files support for any additional recommended security configurations or patches.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
M-Files Corporation
Date Reserved
2025-03-07T11:57:54.664Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 684fda92a8c921274383e0a4

Added to database: 6/16/2025, 8:49:22 AM

Last enriched: 2/23/2026, 9:00:58 PM

Last updated: 3/24/2026, 8:33:39 PM

Views: 114

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses