Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-46320: A cross-site scripting (XSS) vulnerability in a FileMaker WebDirect custom homepage could lead to unauthorized access and remote code execution. in Claris FileMaker Server

0
Medium
VulnerabilityCVE-2025-46320cvecve-2025-46320
Published: Tue Feb 24 2026 (02/24/2026, 20:30:26 UTC)
Source: CVE Database V5
Vendor/Project: Claris
Product: FileMaker Server

Description

A cross-site scripting (XSS) vulnerability in a FileMaker WebDirect custom homepage could lead to unauthorized access and remote code execution. This vulnerability has been fully addressed in FileMaker Server 22.0.4 and FileMaker Server 21.1.7.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/04/2026, 01:52:47 UTC

Technical Analysis

CVE-2025-46320 is a cross-site scripting (XSS) vulnerability affecting the custom homepage feature of FileMaker WebDirect, a web-based interface for Claris FileMaker Server. This vulnerability allows an attacker to inject malicious JavaScript code into the custom homepage, which executes in the context of users visiting the page. The injected script can hijack user sessions, steal sensitive information, or perform actions on behalf of the user, potentially leading to unauthorized access. In some scenarios, this can escalate to remote code execution on the server if combined with other vulnerabilities or misconfigurations. The vulnerability does not require authentication but does require user interaction, such as visiting a crafted URL or page. The issue is addressed in FileMaker Server versions 22.0.4 and 21.1.7, indicating that earlier versions remain vulnerable. The CVSS v3.1 base score of 6.1 reflects a medium severity, with network attack vector, low attack complexity, no privileges required, but user interaction needed, and a scope change indicating impact beyond the vulnerable component. The vulnerability is categorized under CWE-79, which is a common weakness for XSS vulnerabilities. No public exploit code or active exploitation has been reported yet. Organizations using FileMaker Server with WebDirect custom homepages should apply the patches promptly to mitigate risks. The vulnerability's exploitation could compromise confidentiality and integrity of data accessed via WebDirect, impacting business operations and data security.

Potential Impact

The primary impact of CVE-2025-46320 is the potential compromise of user sessions and unauthorized access to sensitive data through the exploitation of the XSS vulnerability in FileMaker WebDirect custom homepages. Attackers can execute arbitrary scripts in the context of authenticated users, leading to data theft, session hijacking, or manipulation of application behavior. In some cases, this may escalate to remote code execution on the server, significantly increasing the severity. Organizations relying on FileMaker Server for critical business applications risk data breaches, loss of data integrity, and potential disruption of services. The vulnerability affects confidentiality and integrity but does not directly impact availability. Since exploitation requires user interaction, social engineering or phishing campaigns could be used to lure victims. The medium CVSS score reflects a moderate risk, but the potential for remote code execution elevates the threat if combined with other weaknesses. Failure to patch could lead to targeted attacks against organizations using vulnerable versions, especially those exposing WebDirect interfaces to the internet. This can result in regulatory compliance issues, reputational damage, and financial losses.

Mitigation Recommendations

To mitigate CVE-2025-46320, organizations should immediately upgrade FileMaker Server to version 22.0.4 or 21.1.7 or later, where the vulnerability has been fully patched. Until patching is complete, restrict access to the WebDirect interface to trusted networks and users only, using network segmentation and firewall rules. Implement strict Content Security Policy (CSP) headers to reduce the risk of XSS exploitation by limiting the execution of unauthorized scripts. Educate users about the risks of clicking on suspicious links or interacting with untrusted content to reduce the likelihood of social engineering attacks. Regularly audit and sanitize any user-generated content or inputs used in custom homepages to prevent injection of malicious scripts. Monitor logs and network traffic for unusual activity indicative of exploitation attempts. Employ web application firewalls (WAFs) with rules targeting XSS patterns to provide an additional layer of defense. Finally, maintain an incident response plan to quickly address any suspected compromise related to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2025-04-22T21:13:49.961Z
Cvss Version
null
State
PUBLISHED

Threat ID: 699e0e51be58cf853b283374

Added to database: 2/24/2026, 8:47:13 PM

Last enriched: 3/4/2026, 1:52:47 AM

Last updated: 4/10/2026, 1:14:27 AM

Views: 62

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses