Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-69907: n/a

0
High
VulnerabilityCVE-2025-69907cvecve-2025-69907
Published: Fri Jan 23 2026 (01/23/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

An unauthenticated information disclosure vulnerability exists in Newgen OmniDocs due to missing authentication and access control on the /omnidocs/GetListofCabinet API endpoint. A remote attacker can access this endpoint without valid credentials to retrieve sensitive internal configuration information, including cabinet names and database-related metadata. This allows unauthorized enumeration of backend deployment details and may facilitate further targeted attacks.

AI-Powered Analysis

AILast updated: 01/23/2026, 15:20:36 UTC

Technical Analysis

CVE-2025-69907 is a security vulnerability identified in Newgen OmniDocs, a document management system widely used for enterprise content and workflow management. The flaw exists in the /omnidocs/GetListofCabinet API endpoint, which lacks proper authentication and access control mechanisms. This allows any remote attacker to query the endpoint without credentials and retrieve sensitive internal configuration information. The disclosed data includes cabinet names and database-related metadata, which are critical for understanding the backend deployment architecture. Such information disclosure can facilitate reconnaissance activities by attackers, enabling them to map the system structure and plan more sophisticated attacks such as privilege escalation, SQL injection, or lateral movement within the network. Although no exploits are currently reported in the wild, the vulnerability's presence in a core API endpoint makes it a significant risk. The absence of a CVSS score indicates that the vulnerability has not yet been fully evaluated, but the nature of the flaw suggests a high impact on confidentiality and potential indirect impacts on integrity and availability if leveraged in chained attacks. The vulnerability affects all versions of Newgen OmniDocs where this endpoint is exposed without authentication, though specific affected versions are not listed. The issue was publicly disclosed in January 2026, highlighting the need for immediate attention from organizations using this software.

Potential Impact

For European organizations, the impact of CVE-2025-69907 can be substantial, especially for those relying on Newgen OmniDocs for managing sensitive documents and workflows. Unauthorized disclosure of cabinet names and database metadata can lead to targeted attacks against the document management infrastructure, potentially resulting in data breaches or disruption of business processes. Confidentiality is directly impacted as sensitive internal configuration details are exposed. This information can be used by attackers to identify weak points, craft phishing or social engineering campaigns, or exploit other vulnerabilities in the system. The lack of authentication requirement means the attack surface is broad, increasing the likelihood of exploitation if the system is internet-facing or accessible from less secure internal networks. While no direct integrity or availability compromise is reported, the information disclosure can be a stepping stone for more damaging attacks. Organizations handling regulated data under GDPR or other European data protection laws may face compliance risks and reputational damage if this vulnerability is exploited. The threat is particularly relevant for sectors such as finance, government, healthcare, and legal services where document management systems are critical and data sensitivity is high.

Mitigation Recommendations

To mitigate CVE-2025-69907, organizations should immediately audit their Newgen OmniDocs deployments to identify if the /omnidocs/GetListofCabinet API endpoint is accessible without authentication. If so, implement strict authentication and authorization controls to restrict access to authorized users only. This may involve configuring the application’s access control policies or deploying web application firewalls (WAFs) to block unauthorized requests. Network segmentation should be enforced to limit exposure of the document management system to trusted internal networks only. Regularly monitor logs for unusual access patterns or repeated unauthenticated requests to this endpoint. If possible, apply vendor patches or updates once available, or engage with Newgen support for recommended security configurations. Additionally, conduct penetration testing focused on API endpoints to uncover similar issues. Educate IT and security teams about this vulnerability to ensure rapid detection and response. Finally, review and update incident response plans to include scenarios involving information disclosure vulnerabilities in document management systems.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69738e544623b1157c4a43a6

Added to database: 1/23/2026, 3:05:56 PM

Last enriched: 1/23/2026, 3:20:36 PM

Last updated: 2/7/2026, 6:24:37 PM

Views: 27

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats