Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-3087: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in M-Files Corporation M-Files Web

0
Medium
VulnerabilityCVE-2025-3087cvecve-2025-3087cwe-79
Published: Fri Apr 04 2025 (04/04/2025, 06:40:07 UTC)
Source: CVE Database V5
Vendor/Project: M-Files Corporation
Product: M-Files Web

Description

CVE-2025-3087 is a stored cross-site scripting (XSS) vulnerability affecting M-Files Web versions from 25. 1. 14445. 5 to 25. 2. 14524. 4. It allows an authenticated user to inject malicious scripts that execute in the context of other users' browsers. The vulnerability arises from improper neutralization of input during web page generation (CWE-79). Exploitation requires low privileges but does require user interaction and authentication.

AI-Powered Analysis

AILast updated: 02/23/2026, 11:02:20 UTC

Technical Analysis

CVE-2025-3087 is a stored cross-site scripting (XSS) vulnerability identified in M-Files Web, a document management and workflow automation platform widely used in enterprise environments. The vulnerability affects versions from 25.1.14445.5 up to 25.2.14524.4. It stems from improper neutralization of user-supplied input during web page generation, classified under CWE-79. An authenticated user with low privileges can inject malicious JavaScript code that is stored persistently on the server and executed in the browsers of other users who view the affected content. This can lead to unauthorized actions such as session hijacking, theft of sensitive information, or execution of arbitrary commands within the context of the victim's session. The vulnerability does not require elevated privileges beyond authentication but does require user interaction to trigger the malicious script execution. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), user interaction required (UI:P), and low impact on confidentiality and integrity (VC:L, VI:L), with no impact on availability. No public exploits have been reported yet, but the presence of stored XSS in a widely used enterprise application presents a significant risk if weaponized. The lack of available patches at the time of reporting means organizations must rely on mitigation strategies until official fixes are released.

Potential Impact

The primary impact of CVE-2025-3087 is on the confidentiality and integrity of data within affected M-Files Web deployments. An attacker exploiting this vulnerability can execute arbitrary scripts in the context of other users, potentially stealing session cookies, credentials, or sensitive documents. This can lead to unauthorized access, data leakage, or privilege escalation within the application. While availability is not directly impacted, successful exploitation may facilitate further attacks that degrade service or compromise system stability. Organizations relying on M-Files Web for document management and workflow automation could face operational disruptions, reputational damage, and compliance violations if sensitive information is exposed. The requirement for authentication limits the attack surface to internal or trusted users, but insider threats or compromised accounts increase risk. The medium CVSS score reflects moderate exploitability and impact, but the potential for chained attacks elevates the overall threat to enterprise environments.

Mitigation Recommendations

1. Monitor M-Files Corporation advisories closely and apply security patches immediately once they become available to address CVE-2025-3087. 2. Implement strict input validation and output encoding on all user-supplied data fields within M-Files Web to prevent injection of malicious scripts. 3. Employ Content Security Policy (CSP) headers to restrict script execution sources and reduce the impact of XSS attacks. 4. Enforce the principle of least privilege for user accounts, limiting access rights to only what is necessary to reduce the risk from compromised credentials. 5. Conduct regular security awareness training for users to recognize and report suspicious activities or unexpected behaviors within the application. 6. Utilize web application firewalls (WAFs) with custom rules to detect and block common XSS payloads targeting M-Files Web. 7. Audit and monitor application logs for unusual input patterns or script injection attempts to enable early detection. 8. Consider isolating M-Files Web access to trusted networks or VPNs to reduce exposure to external attackers. 9. Review and harden session management mechanisms to prevent session fixation or hijacking in case of XSS exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
M-Files Corporation
Date Reserved
2025-04-01T11:52:37.548Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699c3036be58cf853b75f149

Added to database: 2/23/2026, 10:47:18 AM

Last enriched: 2/23/2026, 11:02:20 AM

Last updated: 2/23/2026, 12:00:11 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats