Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-2159: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in M-Files Corporation M-Files Admin

0
Medium
VulnerabilityCVE-2025-2159cvecve-2025-2159cwe-79
Published: Fri Apr 04 2025 (04/04/2025, 06:06:48 UTC)
Source: CVE Database V5
Vendor/Project: M-Files Corporation
Product: M-Files Admin

Description

CVE-2025-2159 is a stored Cross-Site Scripting (XSS) vulnerability in the M-Files Admin tool's Desktop UI before version 25. 3. 14681. 7 on Windows. It allows an authenticated local user with limited privileges to inject and execute malicious scripts via the user interface. Exploitation requires local access and user interaction, but no elevated privileges or authentication bypass. The vulnerability arises from improper neutralization of input during web page generation (CWE-79). While no known exploits are currently reported in the wild, successful exploitation could lead to script execution within the admin tool context, potentially enabling further local attacks or information disclosure. The CVSS 4. 0 base score is 5.

AI-Powered Analysis

AILast updated: 02/23/2026, 11:02:48 UTC

Technical Analysis

CVE-2025-2159 is a stored Cross-Site Scripting (XSS) vulnerability identified in the M-Files Admin tool's Desktop UI component on Windows platforms, affecting versions prior to 25.3.14681.7. This vulnerability is classified under CWE-79, which involves improper neutralization of input during web page generation, allowing malicious scripts to be stored and later executed in the context of the application. The flaw permits an authenticated local user with limited privileges to inject malicious JavaScript or other executable code via the UI, which is then rendered and executed when viewed within the admin tool. The attack vector requires local access and user interaction, but does not require elevated privileges or bypassing authentication mechanisms. The vulnerability does not affect confidentiality or integrity directly but can compromise availability or lead to further local privilege escalation or information disclosure if exploited in combination with other vulnerabilities. The CVSS 4.0 vector indicates low attack complexity, no need for elevated privileges, but requires user interaction and local access, resulting in a medium severity rating with a base score of 5.1. No public exploits or patches are currently available, but the vendor has acknowledged the issue. This vulnerability highlights the risks of insufficient input sanitization in administrative interfaces, especially those accessible locally, which can be leveraged by insider threats or attackers with initial footholds in the environment.

Potential Impact

The primary impact of CVE-2025-2159 is the potential execution of arbitrary scripts within the M-Files Admin tool's Desktop UI context by an authenticated local user. This can lead to several adverse effects including unauthorized actions within the admin tool, manipulation or disclosure of sensitive configuration data, or facilitation of further local attacks such as privilege escalation or lateral movement. Although the vulnerability requires local access and user interaction, it poses a significant risk in environments where multiple users have access to the admin tool or where attackers have gained limited local footholds. Organizations relying on M-Files Admin for document and information management could face operational disruptions or data integrity issues if this vulnerability is exploited. The absence of known exploits in the wild reduces immediate risk, but the medium severity score and the nature of stored XSS in administrative tools warrant proactive mitigation to prevent insider threats or combined attack scenarios. The impact is primarily local but could cascade into broader compromise depending on the environment and attacker capabilities.

Mitigation Recommendations

To mitigate CVE-2025-2159, organizations should: 1) Upgrade M-Files Admin to version 25.3.14681.7 or later once the vendor releases a patch addressing this vulnerability. 2) Until patches are available, restrict local access to the M-Files Admin tool strictly to trusted and authorized personnel to minimize the risk of malicious script injection. 3) Implement strict input validation and sanitization controls on all user inputs within the admin tool interface to prevent injection of executable code. 4) Employ application whitelisting and endpoint protection solutions to detect and block suspicious script execution originating from the admin tool context. 5) Monitor logs and user activities related to the admin tool for unusual behavior indicative of exploitation attempts. 6) Educate local users with access about the risks of executing untrusted scripts or interacting with suspicious inputs. 7) Consider isolating the admin tool environment or using hardened workstations for administrative tasks to reduce exposure. These measures collectively reduce the attack surface and limit the potential for exploitation of this stored XSS vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
M-Files Corporation
Date Reserved
2025-03-10T13:16:07.424Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699c3036be58cf853b75f141

Added to database: 2/23/2026, 10:47:18 AM

Last enriched: 2/23/2026, 11:02:48 AM

Last updated: 2/23/2026, 11:59:49 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats