The flaw, tracked as CVE-2025-13008, affects multiple versions across different release branches and carries a high-severity CVSS 4.0 base score of 8.6.
The vulnerability exists within M-Files Web and requires the attacker to have legitimate authentication credentials.
Once authenticated, an attacker can intercept session tokens of other actively connected users while they perform specific client operations.
By obtaining these tokens, threat actors can impersonate legitimate users and execute actions in their name and with their permissions.
Including accessing confidential documents and potentially modifying critical information.
The flaw is classified as CWE-359 (Exposure of Private Personal Information to an Unauthorized Actor). It represents a session replay scenario per CAPEC-60.
The attack requires user interaction and network accessibility, making it a practical threat in connected environments.
Organizations running the following M-Files Server versions are vulnerable and should prioritize patching:
| Release Branch | Vulnerable Versions | Patched Version |
|---|---|---|
| Current Release | Before 25.12.15491.7 | 25.12.15491.7 |
| LTS 25.8 | Before SR3 | 25.8.15085.18 (SR3) |
| LTS 25.2 | Before SR3 | 25.2.14524.14 (SR3) |
| LTS 24.8 | Before SR5 | 24.8.13981.17 (SR5) |
M-Files has released patched versions addressing this vulnerability. The company received responsible vulnerability disclosure, and no public exploits currently exist.
However, the low probability of exploitation designation should not diminish the urgency of patching.
Given the high-impact nature of successful attacks, unauthorized document access, and potential lateral movement within enterprise systems.
Organizations should prioritize testing and deploying patches across all affected M-Files Server instances.
Simultaneously, security teams should monitor access logs for suspicious user activity that indicates token theft or unauthorized account use.
Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.
The post M-Files Vulnerability Let Attacker Capture Session Tokens of Other Active Users appeared first on Cyber Security News.
Google's NotebookLM can now turn users' research and notes into fully animated "cinematic" videos, going…
Powered by the new M5 chip, Apple’s latest MacBook Airs are more powerful than ever…
Tesla, Ford, and Volvo occupy the top three spots in a new ranking of 18…
The first official trailer has arrived for HBO's Lanterns ahead of its debut in August…
Google is bringing Canvas to everyone in the US using AI Mode in Search. The…
Audible has just unveiled a new subscription plan for 2026. The Audible Standard membership is…
This website uses cookies.