CVE-2021-41810

Script injection in M-Files Admin versions before 22.2.11051.0, allows executing stored script in admin tool. M-Files Admin tool allows storing configuration data with script which may then get run by another vault administrator. Requires vault admin level authentication and is not remotely exploitable
Configurations

Configuration 1 (hide)

cpe:2.3:a:m-files:server:*:*:*:*:*:*:*:*

History

23 Feb 2026, 12:16

Type Values Removed Values Added
References
  • () https://empower.m-files.com/security-advisories/CVE-2021-41810 -
  • () https://product.m-files.com/security-advisories/cve-2021-41810/ -
Summary (en) Admin tool allows storing configuration data with script which may then get run by another vault administrator. Requires vault admin level authentication and is not remotely exploitable (en) Script injection in M-Files Admin versions before 22.2.11051.0, allows executing stored script in admin tool. M-Files Admin tool allows storing configuration data with script which may then get run by another vault administrator. Requires vault admin level authentication and is not remotely exploitable

21 Nov 2024, 06:26

Type Values Removed Values Added
CVSS v2 : 3.5
v3 : 4.8
v2 : 3.5
v3 : 5.2
References () https://www.m-files.com/about/trust-center/security-advisories/cve-2021-41810/ - Vendor Advisory () https://www.m-files.com/about/trust-center/security-advisories/cve-2021-41810/ - Vendor Advisory

Information

Published : 2022-05-02 20:15

Updated : 2026-02-23 12:16


NVD link : CVE-2021-41810

Mitre link : CVE-2021-41810

CVE.ORG link : CVE-2021-41810


JSON object : View

Products Affected

m-files

  • server
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')