Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0932: CWE-918 Server-Side request forgery (SSRF) in M-Files Corporation M-Files Server

0
Medium
VulnerabilityCVE-2026-0932cvecve-2026-0932cwe-918
Published: Wed Apr 01 2026 (04/01/2026, 10:03:27 UTC)
Source: CVE Database V5
Vendor/Project: M-Files Corporation
Product: M-Files Server

Description

Blind server-side request forgery (SSRF) vulnerability in legacy connection methods of document co-authoring features in M-Files Server before 26.3 allow an unauthenticated attacker to cause the server to send HTTP GET requests to arbitrary URLs.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/01/2026, 10:53:41 UTC

Technical Analysis

CVE-2026-0932 is a blind server-side request forgery (SSRF) vulnerability classified under CWE-918, found in legacy connection methods of the document co-authoring features of M-Files Server prior to version 26.3. SSRF vulnerabilities occur when an attacker can induce a vulnerable server to make HTTP requests to arbitrary URLs, often internal or protected resources that are otherwise inaccessible externally. In this case, the vulnerability is exploitable without any authentication or user interaction, making it particularly dangerous. The attacker can trigger the server to send HTTP GET requests to arbitrary destinations, which could be leveraged for internal network reconnaissance, accessing sensitive internal services, or bypassing network access controls. The vulnerability affects legacy connection methods, indicating it may be tied to older protocols or APIs used for document collaboration. The CVSS 4.0 vector indicates a network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and limited impact on confidentiality (VC:L) and availability (VA:L), with no impact on integrity or scope changes. There are no known exploits in the wild at the time of publication, but the vulnerability is publicly disclosed and should be addressed promptly. No official patches are linked yet, but upgrading to version 26.3 or later is recommended. The vulnerability was reserved in January 2026 and published in April 2026 by M-Files Corporation.

Potential Impact

The primary impact of CVE-2026-0932 is the potential for unauthorized internal network reconnaissance and interaction with internal services that are not directly accessible from the internet. By leveraging the SSRF vulnerability, attackers can cause the M-Files Server to send HTTP GET requests to arbitrary URLs, which may include internal IP addresses, cloud metadata services, or other sensitive endpoints. This can lead to information disclosure, such as internal network topology, service banners, or sensitive data exposure. While the vulnerability does not directly allow code execution or data modification, it can be a stepping stone for further attacks, such as exploiting other internal vulnerabilities or pivoting within the network. The fact that no authentication or user interaction is required increases the risk, as attackers can exploit this remotely without valid credentials. Organizations relying on M-Files Server for document management and collaboration may face confidentiality risks and potential service disruptions if attackers leverage this vulnerability as part of a broader attack chain. The medium severity rating reflects these considerations, balancing ease of exploitation with limited direct impact on integrity and availability.

Mitigation Recommendations

To mitigate CVE-2026-0932, organizations should take the following specific actions: 1) Upgrade M-Files Server to version 26.3 or later as soon as the patch is available, since the vulnerability affects versions prior to 26.3. 2) If immediate upgrade is not possible, disable legacy connection methods related to document co-authoring features that are vulnerable, if configurable. 3) Implement strict egress filtering on the M-Files Server to restrict outbound HTTP requests only to trusted destinations, preventing the server from reaching arbitrary URLs. 4) Monitor network traffic from M-Files Server for unusual or unexpected outbound HTTP GET requests, especially to internal IP ranges or suspicious external domains. 5) Review and harden internal network segmentation to limit the impact of SSRF by restricting access to sensitive internal services from the M-Files Server. 6) Employ web application firewalls (WAFs) or intrusion detection systems (IDS) that can detect and block SSRF attack patterns targeting the server. 7) Conduct security awareness and incident response planning to quickly identify and respond to potential exploitation attempts. These targeted mitigations go beyond generic advice by focusing on controlling the vulnerable feature, network egress, and monitoring specific to the M-Files Server environment.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
M-Files Corporation
Date Reserved
2026-01-14T07:38:43.377Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69ccf599e6bfc5ba1dc10440

Added to database: 4/1/2026, 10:38:17 AM

Last enriched: 4/1/2026, 10:53:41 AM

Last updated: 5/16/2026, 11:02:52 AM

Views: 70

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses