CVE-2025-13008

N/A Unknown

📋 TL;DR

An authenticated attacker using M-Files Web can capture session tokens of other active users, potentially allowing impersonation and unauthorized access to sensitive data. This affects organizations running vulnerable versions of M-Files Server with authenticated web access.

💻 Affected Systems

Products:
  • M-Files Server
Versions: Before 25.12.15491.7, 25.8 LTS SR3, 25.2 LTS SR3, and 24.8 LTS SR5
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires M-Files Web access and authenticated attacker. All configurations with vulnerable versions are affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains full access to all user accounts and sensitive documents, leading to data theft, privilege escalation, and complete system compromise.

🟠

Likely Case

Attacker accesses confidential documents and performs unauthorized actions under stolen identities, causing data breaches and compliance violations.

🟢

If Mitigated

Limited impact due to network segmentation, strong authentication controls, and monitoring that detects unusual session activity.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to M-Files Web. The vulnerability is in session token handling.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 25.12.15491.7, 25.8 LTS SR3, 25.2 LTS SR3, or 24.8 LTS SR5

Vendor Advisory: https://product.m-files.com/security-advisories/cve-2025-13008

Restart Required: Yes

Instructions:

1. Download the appropriate patched version from M-Files. 2. Backup your M-Files Server. 3. Install the update following vendor instructions. 4. Restart the M-Files Server service.

🔧 Temporary Workarounds

Restrict M-Files Web Access

all

Limit access to M-Files Web to trusted networks only, reducing attack surface.

Configure firewall rules to restrict access to M-Files Web ports (typically 443/HTTPS) to authorized IP ranges only.

Enforce Session Timeouts

windows

Reduce session token validity period to limit exposure window.

In M-Files Admin, navigate to Authentication settings and set shorter session timeout values (e.g., 15-30 minutes).

🧯 If You Can't Patch

  • Implement network segmentation to isolate M-Files Server from untrusted networks.
  • Enable detailed logging and monitoring for unusual session activity and token reuse.

🔍 How to Verify

Check if Vulnerable:

Check M-Files Server version in M-Files Admin console under Help > About. Compare against affected versions.

Check Version:

In M-Files Admin, go to Help > About to view version details.

Verify Fix Applied:

Confirm version is 25.12.15491.7, 25.8 LTS SR3, 25.2 LTS SR3, or 24.8 LTS SR5 or later in M-Files Admin.

📡 Detection & Monitoring

Log Indicators:

  • Multiple session tokens from same IP/user in short time
  • Unusual session creation patterns
  • Access from unexpected locations

Network Indicators:

  • Abnormal HTTP requests to session-related endpoints in M-Files Web

SIEM Query:

source="m-files" AND (event="session_token" OR event="authentication") | stats count by src_ip, user | where count > threshold

🔗 References

📤 Share & Export