Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-46296: An authorization bypass vulnerability in FileMaker Server Admin Console allowed administrator roles with minimal privileges to access administrative features such as viewing license details and downloading application logs. in Claris FileMaker Server

0
Medium
VulnerabilityCVE-2025-46296cvecve-2025-46296
Published: Tue Dec 16 2025 (12/16/2025, 18:07:37 UTC)
Source: CVE Database V5
Vendor/Project: Claris
Product: FileMaker Server

Description

CVE-2025-46296 is an authorization bypass vulnerability in Claris FileMaker Server Admin Console that allows administrator roles with minimal privileges to access sensitive administrative features, including viewing license details and downloading application logs. The flaw does not require user interaction and can be exploited remotely over the network with low attack complexity. Although it does not allow full administrative control or code execution, it compromises confidentiality and integrity by exposing sensitive information and administrative functions. The vulnerability affects unspecified versions prior to FileMaker Server 22. 0. 4, where it has been fully patched. The CVSS score is 5. 4 (medium severity), reflecting limited impact and moderate exploitability. European organizations using FileMaker Server should prioritize patching to prevent unauthorized access to administrative data. Countries with significant adoption of Claris FileMaker Server and critical infrastructure relying on it are at higher risk.

AI-Powered Analysis

AILast updated: 12/23/2025, 19:34:29 UTC

Technical Analysis

CVE-2025-46296 is an authorization bypass vulnerability identified in the Claris FileMaker Server Admin Console. This vulnerability allows users assigned administrator roles with minimal privileges to bypass intended access controls and gain unauthorized access to administrative features that should be restricted. Specifically, affected users can view license details and download application logs, which may contain sensitive operational information. The vulnerability arises due to improper enforcement of authorization checks within the Admin Console interface. Exploitation requires network access and a privileged account with minimal admin rights but does not require user interaction, making it relatively straightforward to exploit in environments where such accounts exist. The vulnerability does not permit full administrative control, code execution, or disruption of service but compromises confidentiality and integrity by exposing sensitive administrative data and functions. The issue affects unspecified versions of FileMaker Server prior to 22.0.4, where the vendor has implemented a fix. The CVSS v3.1 base score is 5.4, reflecting a medium severity level with the vector AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N, indicating network attack vector, low complexity, required privileges, no user interaction, unchanged scope, and limited confidentiality and integrity impact without availability impact. No known exploits in the wild have been reported to date. The vulnerability is classified under CWE-285 (Improper Authorization).

Potential Impact

For European organizations, this vulnerability poses a risk of unauthorized disclosure of sensitive administrative information such as license details and application logs, which could be leveraged for further attacks or to gain insights into the organization's infrastructure. While it does not allow full administrative control or direct disruption, the exposure of logs and license data can aid attackers in reconnaissance and lateral movement. Organizations in sectors relying on FileMaker Server for critical business applications, including government, finance, healthcare, and manufacturing, may face increased risk if minimal privilege admin accounts are compromised or misused. The breach of confidentiality and integrity could lead to compliance issues under GDPR if personal or sensitive data is indirectly exposed through logs. The medium severity suggests a moderate but non-trivial impact, emphasizing the importance of timely patching and access control hardening to prevent exploitation.

Mitigation Recommendations

1. Apply the official patch by upgrading FileMaker Server to version 22.0.4 or later, where the vulnerability is fully addressed. 2. Restrict access to the Admin Console strictly to trusted administrators and limit the number of accounts with any administrative privileges, even minimal ones. 3. Implement network-level access controls such as VPNs or IP whitelisting to limit exposure of the Admin Console interface. 4. Regularly audit and review administrator roles and privileges to ensure the principle of least privilege is enforced. 5. Monitor administrative logs and access patterns for unusual activity that could indicate exploitation attempts. 6. Consider additional application-layer controls or web application firewalls to detect and block unauthorized access attempts. 7. Educate administrators about the risks of privilege misuse and enforce strong authentication mechanisms, such as multi-factor authentication, for admin accounts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2025-04-22T21:13:49.959Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6941ae5b0d5f6f4391b0c3a9

Added to database: 12/16/2025, 7:09:15 PM

Last enriched: 12/23/2025, 7:34:29 PM

Last updated: 2/7/2026, 10:35:51 AM

Views: 246

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats