Categories: Cyber Security News

M-Files Vulnerability Let Attacker Capture Session Tokens of Other Active Users

An information disclosure vulnerability in M-Files Server enables authenticated attackers to capture and reuse session tokens from active users. Potentially gaining unauthorized access to sensitive document management systems.

The flaw, tracked as CVE-2025-13008, affects multiple versions across different release branches and carries a high-severity CVSS 4.0 base score of 8.6.

The vulnerability exists within M-Files Web and requires the attacker to have legitimate authentication credentials.

Once authenticated, an attacker can intercept session tokens of other actively connected users while they perform specific client operations.

By obtaining these tokens, threat actors can impersonate legitimate users and execute actions in their name and with their permissions.

Including accessing confidential documents and potentially modifying critical information.

The flaw is classified as CWE-359 (Exposure of Private Personal Information to an Unauthorized Actor). It represents a session replay scenario per CAPEC-60.

The attack requires user interaction and network accessibility, making it a practical threat in connected environments.

Affected Versions

Organizations running the following M-Files Server versions are vulnerable and should prioritize patching:

Sponsored
Release Branch Vulnerable Versions Patched Version
Current Release Before 25.12.15491.7 25.12.15491.7
LTS 25.8 Before SR3 25.8.15085.18 (SR3)
LTS 25.2 Before SR3 25.2.14524.14 (SR3)
LTS 24.8 Before SR5 24.8.13981.17 (SR5)

M-Files has released patched versions addressing this vulnerability. The company received responsible vulnerability disclosure, and no public exploits currently exist.

However, the low probability of exploitation designation should not diminish the urgency of patching.

Given the high-impact nature of successful attacks, unauthorized document access, and potential lateral movement within enterprise systems.

Organizations should prioritize testing and deploying patches across all affected M-Files Server instances.

Simultaneously, security teams should monitor access logs for suspicious user activity that indicates token theft or unauthorized account use.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

The post M-Files Vulnerability Let Attacker Capture Session Tokens of Other Active Users appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

NotebookLM can now summarize research in ‘cinematic’ video overviews

Google's NotebookLM can now turn users' research and notes into fully animated "cinematic" videos, going…

8 minutes ago

The new MacBook Air debuts with a $50 gift card as the M4 model hits its best price

Powered by the new M5 chip, Apple’s latest MacBook Airs are more powerful than ever…

8 minutes ago

The world’s biggest automaker has one of the dirtiest supply chains: report

Tesla, Ford, and Volvo occupy the top three spots in a new ranking of 18…

8 minutes ago

Lanterns Trailer Features a Flying Hal Jordan and a John Stewart Who Is Waiting For His Chance to Wield the Iconic Ring

The first official trailer has arrived for HBO's Lanterns ahead of its debut in August…

33 minutes ago

Google’s AI-powered workspace is now available to more users in Search

Google is bringing Canvas to everyone in the US using AI Mode in Search. The…

1 hour ago

Audible Launches a New Subscription Plan for $8.99 Per Month, Including Audiobook Credits

Audible has just unveiled a new subscription plan for 2026. The Audible Standard membership is…

2 hours ago

This website uses cookies.