CVE-2025-46296: An authorization bypass vulnerability in FileMaker Server Admin Console allowed administrator roles with minimal privileges to access administrative features such as viewing license details and downloading application logs. in Claris FileMaker Server
CVE-2025-46296 is an authorization bypass vulnerability in Claris FileMaker Server Admin Console that allows administrator roles with minimal privileges to access sensitive administrative features, including viewing license details and downloading application logs. The flaw does not require user interaction and can be exploited remotely over the network with low attack complexity. Although it does not allow full administrative control or code execution, it compromises confidentiality and integrity by exposing sensitive information and administrative functions. The vulnerability affects unspecified versions prior to FileMaker Server 22. 0. 4, where it has been fully patched. The CVSS score is 5. 4 (medium severity), reflecting limited impact and moderate exploitability. European organizations using FileMaker Server should prioritize patching to prevent unauthorized access to administrative data. Countries with significant adoption of Claris FileMaker Server and critical infrastructure relying on it are at higher risk.
AI Analysis
Technical Summary
CVE-2025-46296 is an authorization bypass vulnerability identified in the Claris FileMaker Server Admin Console. This vulnerability allows users assigned administrator roles with minimal privileges to bypass intended access controls and gain unauthorized access to administrative features that should be restricted. Specifically, affected users can view license details and download application logs, which may contain sensitive operational information. The vulnerability arises due to improper enforcement of authorization checks within the Admin Console interface. Exploitation requires network access and a privileged account with minimal admin rights but does not require user interaction, making it relatively straightforward to exploit in environments where such accounts exist. The vulnerability does not permit full administrative control, code execution, or disruption of service but compromises confidentiality and integrity by exposing sensitive administrative data and functions. The issue affects unspecified versions of FileMaker Server prior to 22.0.4, where the vendor has implemented a fix. The CVSS v3.1 base score is 5.4, reflecting a medium severity level with the vector AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N, indicating network attack vector, low complexity, required privileges, no user interaction, unchanged scope, and limited confidentiality and integrity impact without availability impact. No known exploits in the wild have been reported to date. The vulnerability is classified under CWE-285 (Improper Authorization).
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized disclosure of sensitive administrative information such as license details and application logs, which could be leveraged for further attacks or to gain insights into the organization's infrastructure. While it does not allow full administrative control or direct disruption, the exposure of logs and license data can aid attackers in reconnaissance and lateral movement. Organizations in sectors relying on FileMaker Server for critical business applications, including government, finance, healthcare, and manufacturing, may face increased risk if minimal privilege admin accounts are compromised or misused. The breach of confidentiality and integrity could lead to compliance issues under GDPR if personal or sensitive data is indirectly exposed through logs. The medium severity suggests a moderate but non-trivial impact, emphasizing the importance of timely patching and access control hardening to prevent exploitation.
Mitigation Recommendations
1. Apply the official patch by upgrading FileMaker Server to version 22.0.4 or later, where the vulnerability is fully addressed. 2. Restrict access to the Admin Console strictly to trusted administrators and limit the number of accounts with any administrative privileges, even minimal ones. 3. Implement network-level access controls such as VPNs or IP whitelisting to limit exposure of the Admin Console interface. 4. Regularly audit and review administrator roles and privileges to ensure the principle of least privilege is enforced. 5. Monitor administrative logs and access patterns for unusual activity that could indicate exploitation attempts. 6. Consider additional application-layer controls or web application firewalls to detect and block unauthorized access attempts. 7. Educate administrators about the risks of privilege misuse and enforce strong authentication mechanisms, such as multi-factor authentication, for admin accounts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-46296: An authorization bypass vulnerability in FileMaker Server Admin Console allowed administrator roles with minimal privileges to access administrative features such as viewing license details and downloading application logs. in Claris FileMaker Server
Description
CVE-2025-46296 is an authorization bypass vulnerability in Claris FileMaker Server Admin Console that allows administrator roles with minimal privileges to access sensitive administrative features, including viewing license details and downloading application logs. The flaw does not require user interaction and can be exploited remotely over the network with low attack complexity. Although it does not allow full administrative control or code execution, it compromises confidentiality and integrity by exposing sensitive information and administrative functions. The vulnerability affects unspecified versions prior to FileMaker Server 22. 0. 4, where it has been fully patched. The CVSS score is 5. 4 (medium severity), reflecting limited impact and moderate exploitability. European organizations using FileMaker Server should prioritize patching to prevent unauthorized access to administrative data. Countries with significant adoption of Claris FileMaker Server and critical infrastructure relying on it are at higher risk.
AI-Powered Analysis
Technical Analysis
CVE-2025-46296 is an authorization bypass vulnerability identified in the Claris FileMaker Server Admin Console. This vulnerability allows users assigned administrator roles with minimal privileges to bypass intended access controls and gain unauthorized access to administrative features that should be restricted. Specifically, affected users can view license details and download application logs, which may contain sensitive operational information. The vulnerability arises due to improper enforcement of authorization checks within the Admin Console interface. Exploitation requires network access and a privileged account with minimal admin rights but does not require user interaction, making it relatively straightforward to exploit in environments where such accounts exist. The vulnerability does not permit full administrative control, code execution, or disruption of service but compromises confidentiality and integrity by exposing sensitive administrative data and functions. The issue affects unspecified versions of FileMaker Server prior to 22.0.4, where the vendor has implemented a fix. The CVSS v3.1 base score is 5.4, reflecting a medium severity level with the vector AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N, indicating network attack vector, low complexity, required privileges, no user interaction, unchanged scope, and limited confidentiality and integrity impact without availability impact. No known exploits in the wild have been reported to date. The vulnerability is classified under CWE-285 (Improper Authorization).
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized disclosure of sensitive administrative information such as license details and application logs, which could be leveraged for further attacks or to gain insights into the organization's infrastructure. While it does not allow full administrative control or direct disruption, the exposure of logs and license data can aid attackers in reconnaissance and lateral movement. Organizations in sectors relying on FileMaker Server for critical business applications, including government, finance, healthcare, and manufacturing, may face increased risk if minimal privilege admin accounts are compromised or misused. The breach of confidentiality and integrity could lead to compliance issues under GDPR if personal or sensitive data is indirectly exposed through logs. The medium severity suggests a moderate but non-trivial impact, emphasizing the importance of timely patching and access control hardening to prevent exploitation.
Mitigation Recommendations
1. Apply the official patch by upgrading FileMaker Server to version 22.0.4 or later, where the vulnerability is fully addressed. 2. Restrict access to the Admin Console strictly to trusted administrators and limit the number of accounts with any administrative privileges, even minimal ones. 3. Implement network-level access controls such as VPNs or IP whitelisting to limit exposure of the Admin Console interface. 4. Regularly audit and review administrator roles and privileges to ensure the principle of least privilege is enforced. 5. Monitor administrative logs and access patterns for unusual activity that could indicate exploitation attempts. 6. Consider additional application-layer controls or web application firewalls to detect and block unauthorized access attempts. 7. Educate administrators about the risks of privilege misuse and enforce strong authentication mechanisms, such as multi-factor authentication, for admin accounts.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- apple
- Date Reserved
- 2025-04-22T21:13:49.959Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6941ae5b0d5f6f4391b0c3a9
Added to database: 12/16/2025, 7:09:15 PM
Last enriched: 12/23/2025, 7:34:29 PM
Last updated: 2/7/2026, 10:35:51 AM
Views: 246
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.