CVE-2025-14318

4.3 MEDIUM

📋 TL;DR

M-Files Server versions before 25.12.15491.7 have an improper access control vulnerability that allows authenticated users to download files through M-Files Web using Web Companion even when the Print and Download Prevention module is enabled. This affects organizations using M-Files Server with the prevention module enabled to restrict file downloads.

💻 Affected Systems

Products:
  • M-Files Server
Versions: All versions before 25.12.15491.7
Operating Systems: Windows
Default Config Vulnerable: ✅ No
Notes: Only affects systems where the Print and Download Prevention module is enabled. Systems without this module enabled are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sensitive documents protected by download prevention controls could be exfiltrated by authenticated users who should only have view-only access, potentially leading to data breaches.

🟠

Likely Case

Users with legitimate access to view documents could bypass intended download restrictions and save files locally, violating data protection policies.

🟢

If Mitigated

With proper access controls and monitoring, unauthorized downloads would be detected and prevented through additional security layers.

🌐 Internet-Facing: MEDIUM - If M-Files Web is exposed to the internet, authenticated users could exploit this remotely, but exploitation requires valid credentials.
🏢 Internal Only: MEDIUM - Internal users with legitimate access could bypass download restrictions, but exploitation still requires authentication.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to M-Files Web and knowledge of the Web Companion functionality. No public exploit code is known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 25.12.15491.7

Vendor Advisory: https://product.m-files.com/security-advisories/cve-2025-14318/

Restart Required: Yes

Instructions:

1. Download M-Files Server version 25.12.15491.7 or later from the M-Files customer portal. 2. Run the installer on the M-Files Server. 3. Follow the upgrade wizard. 4. Restart the M-Files Server service after installation completes.

🔧 Temporary Workarounds

Disable Web Companion

windows

Temporarily disable Web Companion functionality in M-Files Server configuration

Navigate to M-Files Admin > Server Configuration > Web Access > Disable Web Companion

Restrict Web Access

all

Limit access to M-Files Web to only trusted users who require download capabilities

Configure firewall rules or application-level access controls to restrict M-Files Web access

🧯 If You Can't Patch

  • Implement network segmentation to isolate M-Files Server from untrusted networks
  • Enable detailed audit logging for all file access attempts and monitor for unauthorized download patterns

🔍 How to Verify

Check if Vulnerable:

Check M-Files Server version in M-Files Admin console under Server Management > About. If version is below 25.12.15491.7 and Print and Download Prevention module is enabled, the system is vulnerable.

Check Version:

In M-Files Admin: Navigate to Server Management > About to view version information

Verify Fix Applied:

After upgrading to 25.12.15491.7 or later, verify that authenticated users cannot download files through Web Companion when Print and Download Prevention is enabled.

📡 Detection & Monitoring

Log Indicators:

  • Multiple file download attempts through Web Companion by users with download prevention restrictions
  • Unusual file access patterns from users with view-only permissions

Network Indicators:

  • Increased outbound traffic from M-Files Server during normal business hours
  • File download requests bypassing normal authentication flows

SIEM Query:

source="m-files" AND (event_type="file_download" OR action="download") AND user_permission="view_only"

🔗 References

📤 Share & Export