CVE-2025-2091

5.4 MEDIUM

📋 TL;DR

An open redirection vulnerability in M-Files mobile applications allows attackers to craft malicious PDF files that trick users into visiting untrusted URLs. This affects Android and iOS users of M-Files mobile apps before version 25.6.0. Attackers can exploit this to redirect users to phishing sites or malicious content.

💻 Affected Systems

Products:
  • M-Files Mobile for Android
  • M-Files Mobile for iOS
Versions: All versions prior to 25.6.0
Operating Systems: Android, iOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects mobile applications, not the M-Files server or desktop clients.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Users could be redirected to sophisticated phishing sites that steal credentials or deliver malware, potentially leading to account compromise or system infection.

🟠

Likely Case

Users redirected to phishing pages attempting to steal login credentials or personal information through social engineering.

🟢

If Mitigated

Users might see unexpected redirects but modern browsers may warn about suspicious sites, reducing successful phishing.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction (opening a malicious PDF), but the technical complexity is low once the PDF is crafted.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 25.6.0

Vendor Advisory: https://product.m-files.com/security-advisories/cve-2025-2091

Restart Required: Yes

Instructions:

1. Open Google Play Store (Android) or App Store (iOS). 2. Search for 'M-Files Mobile'. 3. Update to version 25.6.0 or later. 4. Restart the application after update.

🔧 Temporary Workarounds

Disable PDF preview in M-Files

all

Configure M-Files server to disable PDF preview functionality in mobile apps

User awareness training

all

Educate users to avoid opening PDF files from untrusted sources in M-Files mobile app

🧯 If You Can't Patch

  • Implement network filtering to block known malicious domains and phishing sites
  • Deploy endpoint protection that can detect malicious PDF files

🔍 How to Verify

Check if Vulnerable:

Check M-Files Mobile app version in app settings. If version is below 25.6.0, the system is vulnerable.

Check Version:

Open M-Files Mobile app → Settings → About → Check version number

Verify Fix Applied:

Confirm M-Files Mobile app version is 25.6.0 or higher in app settings.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected redirects from M-Files mobile app to external domains
  • Multiple failed authentication attempts following PDF file access

Network Indicators:

  • HTTP/HTTPS requests from M-Files mobile apps to unusual or newly registered domains
  • Traffic patterns showing mobile app users accessing non-M-Files domains

SIEM Query:

source="mfiles-mobile" AND (url_contains="http://" OR url_contains="https://") AND NOT url_contains="m-files.com"

🔗 References

📤 Share & Export