CVE-2026-0663

Denial-of-service vulnerability in M-Files Server versions before 26.1.15632.3 allows an authenticated attacker with vault administrator privileges to crash the M-Files Server process by calling a vulnerable API endpoint.
References
Link Resource
https://product.m-files.com/security-advisories/cve-2026-0663/ Vendor Advisory Broken Link
Configurations

Configuration 1 (hide)

cpe:2.3:a:m-files:m-files_server:*:*:*:*:*:*:*:*

History

02 Feb 2026, 15:46

Type Values Removed Values Added
References () https://product.m-files.com/security-advisories/cve-2026-0663/ - () https://product.m-files.com/security-advisories/cve-2026-0663/ - Vendor Advisory, Broken Link
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.9
First Time M-files
M-files m-files Server
CPE cpe:2.3:a:m-files:m-files_server:*:*:*:*:*:*:*:*

21 Jan 2026, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-21 11:15

Updated : 2026-02-02 15:46


NVD link : CVE-2026-0663

Mitre link : CVE-2026-0663

CVE.ORG link : CVE-2026-0663


JSON object : View

Products Affected

m-files

  • m-files_server
CWE
CWE-1286

Improper Validation of Syntactic Correctness of Input