CVE-2025-14692

4.3 MEDIUM

📋 TL;DR

This CVE describes an open redirect vulnerability in Mayan EDMS up to version 4.10.1. Attackers can manipulate the authentication component to redirect users to malicious websites. Organizations using Mayan EDMS versions 4.10.1 and earlier are affected.

💻 Affected Systems

Products:
  • Mayan EDMS
Versions: Up to and including 4.10.1
Operating Systems: All platforms running Mayan EDMS
Default Config Vulnerable: ⚠️ Yes
Notes: All installations using affected versions are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Users could be redirected to phishing sites that steal credentials or deliver malware, potentially leading to account compromise or system infection.

🟠

Likely Case

Attackers redirect users to phishing pages to harvest credentials or display malicious content.

🟢

If Mitigated

With proper web application firewalls and user awareness training, impact is limited to failed redirect attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Proof-of-concept exploit code is publicly available on GitHub, making exploitation straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.10.2

Vendor Advisory: https://docs.mayan-edms.com/chapters/releases/4.10.2.html#security

Restart Required: Yes

Instructions:

1. Backup your Mayan EDMS installation and database
2. Upgrade to version 4.10.2 using pip: pip install mayan-edms==4.10.2
3. Run database migrations: mayan-edms.py performupgrade
4. Restart the Mayan EDMS service

🔧 Temporary Workarounds

Web Application Firewall Rule

all

Block redirects to external domains from the authentication endpoint

WAF-specific rules to block requests to /authentication/ with external URLs in parameters

Reverse Proxy Configuration

linux

Configure reverse proxy to validate redirect URLs

nginx: location ~ ^/authentication/ { if ($args ~* "(http|https)://[^/]*") { return 403; } }
Apache: RewriteCond %{QUERY_STRING} (http|https):// [NC]
RewriteRule ^authentication/ - [F]

🧯 If You Can't Patch

  • Implement strict web application firewall rules to block external redirects from the authentication endpoint
  • Monitor authentication logs for suspicious redirect patterns and implement user awareness training about phishing risks

🔍 How to Verify

Check if Vulnerable:

Check if Mayan EDMS version is 4.10.1 or earlier by examining the installed package version

Check Version:

pip show mayan-edms | grep Version

Verify Fix Applied:

Confirm installation of version 4.10.2 and test that redirects from /authentication/ only go to allowed internal URLs

📡 Detection & Monitoring

Log Indicators:

  • HTTP 302 redirect responses from /authentication/ endpoint with external domains
  • Unusual redirect patterns in authentication logs

Network Indicators:

  • Outbound HTTP/HTTPS requests to unfamiliar domains following authentication attempts

SIEM Query:

source="mayan_edms_logs" AND (url_path="/authentication/" AND status_code=302 AND redirect_url CONTAINS "http")

🔗 References

📤 Share & Export