Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0932: CWE-918 Server-Side request forgery (SSRF) in M-Files Corporation M-Files Server

0
Medium
VulnerabilityCVE-2026-0932cvecve-2026-0932cwe-918
Published: Wed Apr 01 2026 (04/01/2026, 10:03:27 UTC)
Source: CVE Database V5
Vendor/Project: M-Files Corporation
Product: M-Files Server

Description

CVE-2026-0932 is a medium-severity blind server-side request forgery (SSRF) vulnerability affecting legacy connection methods in the document co-authoring features of M-Files Server versions prior to 26. 3. This vulnerability allows an unauthenticated attacker to cause the server to send HTTP GET requests to arbitrary URLs, potentially enabling internal network reconnaissance or interaction with internal services. Exploitation does not require authentication or user interaction, and the attack surface is exposed via legacy document collaboration features. Although no known exploits are currently reported in the wild, the vulnerability poses risks to confidentiality and integrity due to possible unauthorized internal resource access. Organizations using affected M-Files Server versions should prioritize patching or mitigating this issue to prevent exploitation. The countries most at risk are those with significant deployments of M-Files Server, including the United States, Germany, United Kingdom, Canada, Australia, and others with strong enterprise document management usage. The CVSS 4. 0 base score is 6. 9, reflecting medium severity due to network attack vector, no privileges required, and limited impact on confidentiality and availability.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/01/2026, 10:53:41 UTC

Technical Analysis

CVE-2026-0932 is a blind server-side request forgery (SSRF) vulnerability classified under CWE-918, found in legacy connection methods of the document co-authoring features of M-Files Server prior to version 26.3. SSRF vulnerabilities occur when an attacker can induce a vulnerable server to make HTTP requests to arbitrary URLs, often internal or protected resources that are otherwise inaccessible externally. In this case, the vulnerability is exploitable without any authentication or user interaction, making it particularly dangerous. The attacker can trigger the server to send HTTP GET requests to arbitrary destinations, which could be leveraged for internal network reconnaissance, accessing sensitive internal services, or bypassing network access controls. The vulnerability affects legacy connection methods, indicating it may be tied to older protocols or APIs used for document collaboration. The CVSS 4.0 vector indicates a network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and limited impact on confidentiality (VC:L) and availability (VA:L), with no impact on integrity or scope changes. There are no known exploits in the wild at the time of publication, but the vulnerability is publicly disclosed and should be addressed promptly. No official patches are linked yet, but upgrading to version 26.3 or later is recommended. The vulnerability was reserved in January 2026 and published in April 2026 by M-Files Corporation.

Potential Impact

The primary impact of CVE-2026-0932 is the potential for unauthorized internal network reconnaissance and interaction with internal services that are not directly accessible from the internet. By leveraging the SSRF vulnerability, attackers can cause the M-Files Server to send HTTP GET requests to arbitrary URLs, which may include internal IP addresses, cloud metadata services, or other sensitive endpoints. This can lead to information disclosure, such as internal network topology, service banners, or sensitive data exposure. While the vulnerability does not directly allow code execution or data modification, it can be a stepping stone for further attacks, such as exploiting other internal vulnerabilities or pivoting within the network. The fact that no authentication or user interaction is required increases the risk, as attackers can exploit this remotely without valid credentials. Organizations relying on M-Files Server for document management and collaboration may face confidentiality risks and potential service disruptions if attackers leverage this vulnerability as part of a broader attack chain. The medium severity rating reflects these considerations, balancing ease of exploitation with limited direct impact on integrity and availability.

Mitigation Recommendations

To mitigate CVE-2026-0932, organizations should take the following specific actions: 1) Upgrade M-Files Server to version 26.3 or later as soon as the patch is available, since the vulnerability affects versions prior to 26.3. 2) If immediate upgrade is not possible, disable legacy connection methods related to document co-authoring features that are vulnerable, if configurable. 3) Implement strict egress filtering on the M-Files Server to restrict outbound HTTP requests only to trusted destinations, preventing the server from reaching arbitrary URLs. 4) Monitor network traffic from M-Files Server for unusual or unexpected outbound HTTP GET requests, especially to internal IP ranges or suspicious external domains. 5) Review and harden internal network segmentation to limit the impact of SSRF by restricting access to sensitive internal services from the M-Files Server. 6) Employ web application firewalls (WAFs) or intrusion detection systems (IDS) that can detect and block SSRF attack patterns targeting the server. 7) Conduct security awareness and incident response planning to quickly identify and respond to potential exploitation attempts. These targeted mitigations go beyond generic advice by focusing on controlling the vulnerable feature, network egress, and monitoring specific to the M-Files Server environment.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
M-Files Corporation
Date Reserved
2026-01-14T07:38:43.377Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69ccf599e6bfc5ba1dc10440

Added to database: 4/1/2026, 10:38:17 AM

Last enriched: 4/1/2026, 10:53:41 AM

Last updated: 4/1/2026, 11:39:19 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses