First published: Wed Nov 22 2023(Updated: )
Missing access permissions checks in the M-Files server before 23.11.13156.0 allow attackers to perform data write and export jobs using the M-Files API methods.
Credit: security@m-files.com
Affected Software | Affected Version | How to fix |
---|---|---|
M-files M-files Server | <23.11.13156.0 |
Update to the patched version.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6189 refers to the vulnerability in M-Files Server that allows attackers to perform unauthorized data write and export jobs using the M-Files API methods.
CVE-2023-6189 affects M-Files Server versions before 23.11.13156.0 by allowing attackers to bypass access permissions checks and perform unauthorized data write and export jobs.
The severity of CVE-2023-6189 is medium with a CVSS score of 5.3.
To fix CVE-2023-6189, it is recommended to update M-Files Server to version 23.11.13156.0 or later.
You can find more information about CVE-2023-6189 at the M-Files Trust Center security advisories page: https://www.m-files.com/about/trust-center/security-advisories/cve-2023-6189/