Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-53910 (GCVE-0-2025-53910)
Vulnerability from cvelistv5 – Published: 2025-08-11 18:57 – Updated: 2025-08-11 19:37
VLAI?
EPSS
Title
Unauthorized Channel Subscription Edit in Mattermost Confluence Plugin
Summary
Mattermost Confluence Plugin version <1.5.0 fails to check the access of the user to the channel which allows attackers to create a channel subscription without proper access to the channel via API call to the edit channel subscription endpoint.
Severity ?
4 (Medium)
CWE
- CWE-862 - Missing Authorization
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Mattermost | Mattermost Confluence Plugin |
Affected:
0 , < 1.5.0
(semver)
Unaffected: 1.5.0 |
Credits
Lorenzo Gallegos
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-53910",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-11T19:37:31.954071Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-08-11T19:37:44.454Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Mattermost Confluence Plugin",
"repo": "https://github.com/mattermost/mattermost-plugin-confluence/",
"vendor": "Mattermost",
"versions": [
{
"lessThan": "1.5.0",
"status": "affected",
"version": "0",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "1.5.0"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Lorenzo Gallegos"
}
],
"descriptions": [
{
"lang": "en",
"value": "Mattermost Confluence Plugin version \u003c1.5.0 fails to check the access of the user to the channel which allows attackers to create a channel subscription without proper access to the channel via API call to the edit channel subscription endpoint."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-862",
"description": "CWE-862: Missing Authorization",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-11T18:57:03.212Z",
"orgId": "9302f53e-dde5-4bf3-b2f2-a83f91ac0eee",
"shortName": "Mattermost"
},
"references": [
{
"url": "https://mattermost.com/security-updates"
}
],
"solutions": [
{
"lang": "en",
"value": "Update Mattermost Confluence Plugin to version 1.5.0 or higher."
}
],
"source": {
"advisory": "MMSA-2025-00480",
"defect": [
"https://mattermost.atlassian.net/browse/MM-64168"
],
"discovery": "{\"self\"=\u003e\"https://mattermost.atlassian.net/rest/api/2/customFieldOption/10557\", \"value\"=\u003e\"Internal\", \"id\"=\u003e\"10557\"}"
},
"title": "Unauthorized Channel Subscription Edit in Mattermost Confluence Plugin"
}
},
"cveMetadata": {
"assignerOrgId": "9302f53e-dde5-4bf3-b2f2-a83f91ac0eee",
"assignerShortName": "Mattermost",
"cveId": "CVE-2025-53910",
"datePublished": "2025-08-11T18:57:03.212Z",
"dateReserved": "2025-07-28T14:26:12.450Z",
"dateUpdated": "2025-08-11T19:37:44.454Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-53910\",\"sourceIdentifier\":\"responsibledisclosure@mattermost.com\",\"published\":\"2025-08-11T19:15:29.747\",\"lastModified\":\"2025-09-25T18:56:23.133\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Mattermost Confluence Plugin version \u003c1.5.0 fails to check the access of the user to the channel which allows attackers to create a channel subscription without proper access to the channel via API call to the edit channel subscription endpoint.\"},{\"lang\":\"es\",\"value\":\"La versi\u00f3n \u0026lt;1.5.0 del complemento Mattermost Confluence no puede verificar el acceso del usuario al canal, lo que permite a los atacantes crear una suscripci\u00f3n al canal sin el acceso adecuado al canal a trav\u00e9s de una llamada API al endpoint de edici\u00f3n de suscripci\u00f3n del canal.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"responsibledisclosure@mattermost.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N\",\"baseScore\":4.0,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.2,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"responsibledisclosure@mattermost.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-862\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mattermost:confluence:*:*:*:*:*:mattermost:*:*\",\"versionEndExcluding\":\"1.5.0\",\"matchCriteriaId\":\"FA975409-AB8C-4894-A040-D7681CE73598\"}]}]}],\"references\":[{\"url\":\"https://mattermost.com/security-updates\",\"source\":\"responsibledisclosure@mattermost.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-53910\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-08-11T19:37:31.954071Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-08-11T19:37:36.220Z\"}}], \"cna\": {\"title\": \"Unauthorized Channel Subscription Edit in Mattermost Confluence Plugin\", \"source\": {\"defect\": [\"https://mattermost.atlassian.net/browse/MM-64168\"], \"advisory\": \"MMSA-2025-00480\", \"discovery\": \"{\\\"self\\\"=\u003e\\\"https://mattermost.atlassian.net/rest/api/2/customFieldOption/10557\\\", \\\"value\\\"=\u003e\\\"Internal\\\", \\\"id\\\"=\u003e\\\"10557\\\"}\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Lorenzo Gallegos\"}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 4, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"repo\": \"https://github.com/mattermost/mattermost-plugin-confluence/\", \"vendor\": \"Mattermost\", \"product\": \"Mattermost Confluence Plugin\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"1.5.0\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"1.5.0\"}], \"defaultStatus\": \"unaffected\"}], \"solutions\": [{\"lang\": \"en\", \"value\": \"Update Mattermost Confluence Plugin to version 1.5.0 or higher.\"}], \"references\": [{\"url\": \"https://mattermost.com/security-updates\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Mattermost Confluence Plugin version \u003c1.5.0 fails to check the access of the user to the channel which allows attackers to create a channel subscription without proper access to the channel via API call to the edit channel subscription endpoint.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-862\", \"description\": \"CWE-862: Missing Authorization\"}]}], \"providerMetadata\": {\"orgId\": \"9302f53e-dde5-4bf3-b2f2-a83f91ac0eee\", \"shortName\": \"Mattermost\", \"dateUpdated\": \"2025-08-11T18:57:03.212Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-53910\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-08-11T19:37:44.454Z\", \"dateReserved\": \"2025-07-28T14:26:12.450Z\", \"assignerOrgId\": \"9302f53e-dde5-4bf3-b2f2-a83f91ac0eee\", \"datePublished\": \"2025-08-11T18:57:03.212Z\", \"assignerShortName\": \"Mattermost\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
FKIE_CVE-2025-53910
Vulnerability from fkie_nvd - Published: 2025-08-11 19:15 - Updated: 2025-09-25 18:56
Severity ?
Summary
Mattermost Confluence Plugin version <1.5.0 fails to check the access of the user to the channel which allows attackers to create a channel subscription without proper access to the channel via API call to the edit channel subscription endpoint.
References
| URL | Tags | ||
|---|---|---|---|
| responsibledisclosure@mattermost.com | https://mattermost.com/security-updates | Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| mattermost | confluence | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mattermost:confluence:*:*:*:*:*:mattermost:*:*",
"matchCriteriaId": "FA975409-AB8C-4894-A040-D7681CE73598",
"versionEndExcluding": "1.5.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Mattermost Confluence Plugin version \u003c1.5.0 fails to check the access of the user to the channel which allows attackers to create a channel subscription without proper access to the channel via API call to the edit channel subscription endpoint."
},
{
"lang": "es",
"value": "La versi\u00f3n \u0026lt;1.5.0 del complemento Mattermost Confluence no puede verificar el acceso del usuario al canal, lo que permite a los atacantes crear una suscripci\u00f3n al canal sin el acceso adecuado al canal a trav\u00e9s de una llamada API al endpoint de edici\u00f3n de suscripci\u00f3n del canal."
}
],
"id": "CVE-2025-53910",
"lastModified": "2025-09-25T18:56:23.133",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 1.4,
"source": "responsibledisclosure@mattermost.com",
"type": "Secondary"
}
]
},
"published": "2025-08-11T19:15:29.747",
"references": [
{
"source": "responsibledisclosure@mattermost.com",
"tags": [
"Vendor Advisory"
],
"url": "https://mattermost.com/security-updates"
}
],
"sourceIdentifier": "responsibledisclosure@mattermost.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-862"
}
],
"source": "responsibledisclosure@mattermost.com",
"type": "Secondary"
}
]
}
CNVD-2025-21461
Vulnerability from cnvd - Published: 2025-09-17
VLAI Severity ?
Title
Mattermost Confluence Plugin存在未明漏洞(CNVD-2025-21461)
Description
Mattermost Confluence Plugin是美国Mattermost公司的一个插件。
Mattermost Confluence Plugin存在安全漏洞,攻击者可利用该漏洞导致创建通道订阅。
Severity
低
Patch Name
Mattermost Confluence Plugin存在未明漏洞(CNVD-2025-21461)的补丁
Patch Description
Mattermost Confluence Plugin是美国Mattermost公司的一个插件。
Mattermost Confluence Plugin存在安全漏洞,攻击者可利用该漏洞导致创建通道订阅。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
厂商已发布了漏洞修复程序,请及时关注更新: https://mattermost.com/security-updates/
Reference
https://nvd.nist.gov/vuln/detail/CVE-2025-53910
Impacted products
| Name | Mattermost Confluence Plugin <1.5.0 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2025-53910",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2025-53910"
}
},
"description": "Mattermost Confluence Plugin\u662f\u7f8e\u56fdMattermost\u516c\u53f8\u7684\u4e00\u4e2a\u63d2\u4ef6\u3002\n\nMattermost Confluence Plugin\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u521b\u5efa\u901a\u9053\u8ba2\u9605\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://mattermost.com/security-updates/",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2025-21461",
"openTime": "2025-09-17",
"patchDescription": "Mattermost Confluence Plugin\u662f\u7f8e\u56fdMattermost\u516c\u53f8\u7684\u4e00\u4e2a\u63d2\u4ef6\u3002\r\n\r\nMattermost Confluence Plugin\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u521b\u5efa\u901a\u9053\u8ba2\u9605\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Mattermost Confluence Plugin\u5b58\u5728\u672a\u660e\u6f0f\u6d1e\uff08CNVD-2025-21461\uff09\u7684\u8865\u4e01",
"products": {
"product": "Mattermost Confluence Plugin \u003c1.5.0"
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2025-53910",
"serverity": "\u4f4e",
"submitTime": "2025-08-15",
"title": "Mattermost Confluence Plugin\u5b58\u5728\u672a\u660e\u6f0f\u6d1e\uff08CNVD-2025-21461\uff09"
}
BDU:2025-09759
Vulnerability from fstec - Published: 10.07.2025
VLAI Severity ?
Title
Уязвимость плагина Confluence приложения для обмена мгновенными сообщениями Mattermost, связанная с недостатками процедуры авторизации, позволяющая нарушителю повысить свои привилегии
Description
Уязвимость плагина Confluence приложения для обмена мгновенными сообщениями Mattermost связана с недостатками процедуры авторизации. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, повысить свои привилегии
Severity ?
Vendor
Mattermost Inc
Software Name
Mattermost Confluence
Software Version
до 1.5.0 (Mattermost Confluence)
Possible Mitigations
Использовать рекомендаций:
https://mattermost.com/security-updates/
https://github.com/mattermost/mattermost-plugin-confluence/releases/tag/v1.5.0
Reference
https://osv.dev/vulnerability/GHSA-v6c8-g53h-mc2h
https://github.com/mattermost/mattermost-plugin-confluence
https://vuldb.com/?id.319467
CWE
CWE-862
{
"CVSS 2.0": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"CVSS 3.0": "AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Mattermost Inc",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "\u0434\u043e 1.5.0 (Mattermost Confluence)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\nhttps://mattermost.com/security-updates/\nhttps://github.com/mattermost/mattermost-plugin-confluence/releases/tag/v1.5.0",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "10.07.2025",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "14.08.2025",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "14.08.2025",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2025-09759",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2025-53910",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0430\u0440\u0445\u0438\u0442\u0435\u043a\u0442\u0443\u0440\u044b",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Mattermost Confluence",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043b\u0430\u0433\u0438\u043d\u0430 Confluence \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u043e\u0431\u043c\u0435\u043d\u0430 \u043c\u0433\u043d\u043e\u0432\u0435\u043d\u043d\u044b\u043c\u0438 \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044f\u043c\u0438 Mattermost, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0430\u043c\u0438 \u043f\u0440\u043e\u0446\u0435\u0434\u0443\u0440\u044b \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u0430\u0446\u0438\u0438, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u0435 \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u0430\u0446\u0438\u0438 (CWE-862)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043b\u0430\u0433\u0438\u043d\u0430 Confluence \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u043e\u0431\u043c\u0435\u043d\u0430 \u043c\u0433\u043d\u043e\u0432\u0435\u043d\u043d\u044b\u043c\u0438 \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044f\u043c\u0438 Mattermost \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0430\u043c\u0438 \u043f\u0440\u043e\u0446\u0435\u0434\u0443\u0440\u044b \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u0430\u0446\u0438\u0438. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041d\u0430\u0440\u0443\u0448\u0435\u043d\u0438\u0435 \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u0430\u0446\u0438\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://osv.dev/vulnerability/GHSA-v6c8-g53h-mc2h\nhttps://github.com/mattermost/mattermost-plugin-confluence\nhttps://vuldb.com/?id.319467",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-862",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041d\u0438\u0437\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 2,6)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.1 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 4)"
}
WID-SEC-W-2025-1663
Vulnerability from csaf_certbund - Published: 2025-07-28 22:00 - Updated: 2025-08-11 22:00Summary
Mattermost Plugins: Mehrere Schwachstellen ermöglichen Umgehung von Sicherheitsmechanismen
Severity
Mittel
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: Mattermost ist ein webbasierter Instant-Messaging-Dienst.
Angriff: Ein Angreifer kann mehrere Schwachstellen im Mattermost Confluence Plugin ausnutzen, um Sicherheitsmechanismen zu umgehen.
Betroffene Betriebssysteme: - Sonstiges
- UNIX
- Windows
References
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Mattermost ist ein webbasierter Instant-Messaging-Dienst.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen im Mattermost Confluence Plugin ausnutzen, um Sicherheitsmechanismen zu umgehen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-1663 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1663.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-1663 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1663"
},
{
"category": "external",
"summary": "Mattermost Plugins vom 2025-07-28",
"url": "https://mattermost.com/security-updates/#plugins"
}
],
"source_lang": "en-US",
"title": "Mattermost Plugins: Mehrere Schwachstellen erm\u00f6glichen Umgehung von Sicherheitsmechanismen",
"tracking": {
"current_release_date": "2025-08-11T22:00:00.000+00:00",
"generator": {
"date": "2025-08-12T11:17:09.763+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2025-1663",
"initial_release_date": "2025-07-28T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-07-28T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-08-11T22:00:00.000+00:00",
"number": "2",
"summary": "CVE, Bewertung und Beschreibung nach Ver\u00f6ffentlichung von Mattermost erg\u00e4nzt"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "Confluence Space Plugin \u003c1.5.0",
"product": {
"name": "Mattermost Mattermost Confluence Space Plugin \u003c1.5.0",
"product_id": "T045996"
}
},
{
"category": "product_version",
"name": "Confluence Space Plugin 1.5.0",
"product": {
"name": "Mattermost Mattermost Confluence Space Plugin 1.5.0",
"product_id": "T045996-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:mattermost:mattermost_server:confluence_space_plugin__1.5.0"
}
}
}
],
"category": "product_name",
"name": "Mattermost"
}
],
"category": "vendor",
"name": "Mattermost"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-44001",
"product_status": {
"known_affected": [
"T045996"
]
},
"release_date": "2025-07-28T22:00:00.000+00:00",
"title": "CVE-2025-44001"
},
{
"cve": "CVE-2025-44004",
"product_status": {
"known_affected": [
"T045996"
]
},
"release_date": "2025-07-28T22:00:00.000+00:00",
"title": "CVE-2025-44004"
},
{
"cve": "CVE-2025-48731",
"product_status": {
"known_affected": [
"T045996"
]
},
"release_date": "2025-07-28T22:00:00.000+00:00",
"title": "CVE-2025-48731"
},
{
"cve": "CVE-2025-52931",
"product_status": {
"known_affected": [
"T045996"
]
},
"release_date": "2025-07-28T22:00:00.000+00:00",
"title": "CVE-2025-52931"
},
{
"cve": "CVE-2025-53857",
"product_status": {
"known_affected": [
"T045996"
]
},
"release_date": "2025-07-28T22:00:00.000+00:00",
"title": "CVE-2025-53857"
},
{
"cve": "CVE-2025-53910",
"product_status": {
"known_affected": [
"T045996"
]
},
"release_date": "2025-07-28T22:00:00.000+00:00",
"title": "CVE-2025-53910"
},
{
"cve": "CVE-2025-54458",
"product_status": {
"known_affected": [
"T045996"
]
},
"release_date": "2025-07-28T22:00:00.000+00:00",
"title": "CVE-2025-54458"
},
{
"cve": "CVE-2025-54525",
"product_status": {
"known_affected": [
"T045996"
]
},
"release_date": "2025-07-28T22:00:00.000+00:00",
"title": "CVE-2025-54525"
},
{
"cve": "CVE-2025-8285",
"product_status": {
"known_affected": [
"T045996"
]
},
"release_date": "2025-07-28T22:00:00.000+00:00",
"title": "CVE-2025-8285"
}
]
}
GHSA-V6C8-G53H-MC2H
Vulnerability from github – Published: 2025-08-11 21:31 – Updated: 2025-08-11 23:34
VLAI?
Summary
Mattermost Confluence Plugin has Missing Authorization vulnerability
Details
Mattermost Confluence Plugin versions < 1.5.0 fail to check user access to the channel, allowing attackers to create a channel subscription without proper access to the channel via an API call to the edit channel subscription endpoint.
Severity ?
4.0 (Medium)
{
"affected": [
{
"package": {
"ecosystem": "Go",
"name": "github.com/mattermost/mattermost-plugin-confluence"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.5.0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2025-53910"
],
"database_specific": {
"cwe_ids": [
"CWE-862"
],
"github_reviewed": true,
"github_reviewed_at": "2025-08-11T23:34:05Z",
"nvd_published_at": "2025-08-11T19:15:29Z",
"severity": "MODERATE"
},
"details": "Mattermost Confluence Plugin versions \u003c 1.5.0 fail to check user access to the channel, allowing attackers to create a channel subscription without proper access to the channel via an API call to the edit channel subscription endpoint.",
"id": "GHSA-v6c8-g53h-mc2h",
"modified": "2025-08-11T23:34:05Z",
"published": "2025-08-11T21:31:40Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53910"
},
{
"type": "PACKAGE",
"url": "https://github.com/mattermost/mattermost-plugin-confluence"
},
{
"type": "WEB",
"url": "https://mattermost.com/security-updates"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N",
"type": "CVSS_V3"
}
],
"summary": "Mattermost Confluence Plugin has Missing Authorization vulnerability"
}
OPENSUSE-SU-2025:15469-1
Vulnerability from csaf_opensuse - Published: 2025-08-20 00:00 - Updated: 2025-08-20 00:00Summary
govulncheck-vulndb-0.0.20250818T190335-1.1 on GA media
Severity
Moderate
Notes
Title of the patch: govulncheck-vulndb-0.0.20250818T190335-1.1 on GA media
Description of the patch: These are all security issues fixed in the govulncheck-vulndb-0.0.20250818T190335-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames: openSUSE-Tumbleweed-2025-15469
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
5.9 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "govulncheck-vulndb-0.0.20250818T190335-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the govulncheck-vulndb-0.0.20250818T190335-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15469",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15469-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-26154 page",
"url": "https://www.suse.com/security/cve/CVE-2023-26154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-44001 page",
"url": "https://www.suse.com/security/cve/CVE-2025-44001/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-44004 page",
"url": "https://www.suse.com/security/cve/CVE-2025-44004/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-48731 page",
"url": "https://www.suse.com/security/cve/CVE-2025-48731/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-49221 page",
"url": "https://www.suse.com/security/cve/CVE-2025-49221/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-50946 page",
"url": "https://www.suse.com/security/cve/CVE-2025-50946/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-52931 page",
"url": "https://www.suse.com/security/cve/CVE-2025-52931/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-53514 page",
"url": "https://www.suse.com/security/cve/CVE-2025-53514/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-53857 page",
"url": "https://www.suse.com/security/cve/CVE-2025-53857/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-53910 page",
"url": "https://www.suse.com/security/cve/CVE-2025-53910/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-54458 page",
"url": "https://www.suse.com/security/cve/CVE-2025-54458/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-54463 page",
"url": "https://www.suse.com/security/cve/CVE-2025-54463/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-54478 page",
"url": "https://www.suse.com/security/cve/CVE-2025-54478/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-54525 page",
"url": "https://www.suse.com/security/cve/CVE-2025-54525/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-55196 page",
"url": "https://www.suse.com/security/cve/CVE-2025-55196/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-55198 page",
"url": "https://www.suse.com/security/cve/CVE-2025-55198/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-55199 page",
"url": "https://www.suse.com/security/cve/CVE-2025-55199/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-8285 page",
"url": "https://www.suse.com/security/cve/CVE-2025-8285/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-9039 page",
"url": "https://www.suse.com/security/cve/CVE-2025-9039/"
}
],
"title": "govulncheck-vulndb-0.0.20250818T190335-1.1 on GA media",
"tracking": {
"current_release_date": "2025-08-20T00:00:00Z",
"generator": {
"date": "2025-08-20T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15469-1",
"initial_release_date": "2025-08-20T00:00:00Z",
"revision_history": [
{
"date": "2025-08-20T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"product": {
"name": "govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"product_id": "govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"product": {
"name": "govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"product_id": "govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"product": {
"name": "govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"product_id": "govulncheck-vulndb-0.0.20250818T190335-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64",
"product": {
"name": "govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64",
"product_id": "govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64"
},
"product_reference": "govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le"
},
"product_reference": "govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "govulncheck-vulndb-0.0.20250818T190335-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x"
},
"product_reference": "govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
},
"product_reference": "govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-26154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-26154"
}
],
"notes": [
{
"category": "general",
"text": "Versions of the package pubnub before 7.4.0; all versions of the package com.pubnub:pubnub; versions of the package pubnub before 6.19.0; all versions of the package github.com/pubnub/go; versions of the package github.com/pubnub/go/v7 before 7.2.0; versions of the package pubnub before 7.3.0; versions of the package pubnub/pubnub before 6.1.0; versions of the package pubnub before 5.3.0; versions of the package pubnub before 0.4.0; versions of the package pubnub/c-core before 4.5.0; versions of the package com.pubnub:pubnub-kotlin before 7.7.0; versions of the package pubnub/swift before 6.2.0; versions of the package pubnub before 5.2.0; versions of the package pubnub before 4.3.0 are vulnerable to Insufficient Entropy via the getKey function, due to inefficient implementation of the AES-256-CBC cryptographic algorithm. The provided encrypt function is less secure when hex encoding and trimming are applied, leaving half of the bits in the key always the same for every encoded message or file.\r\r**Note:**\r\rIn order to exploit this vulnerability, the attacker needs to invest resources in preparing the attack and brute-force the encryption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-26154",
"url": "https://www.suse.com/security/cve/CVE-2023-26154"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-20T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-26154"
},
{
"cve": "CVE-2025-44001",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-44001"
}
],
"notes": [
{
"category": "general",
"text": "Mattermost Confluence Plugin version \u003c1.5.0 fails to check the access of the user to the channel which allows attackers to get channel subscription details without proper access to the channel via API call to the Get Channel Subscriptions details endpoint.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-44001",
"url": "https://www.suse.com/security/cve/CVE-2025-44001"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-20T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-44001"
},
{
"cve": "CVE-2025-44004",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-44004"
}
],
"notes": [
{
"category": "general",
"text": "Mattermost Confluence Plugin version \u003c1.5.0 fails to check the authorization of the user to the Mattermost instance which allows attackers to create a channel subscription without proper authorization via API call to the create channel subscription endpoint.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-44004",
"url": "https://www.suse.com/security/cve/CVE-2025-44004"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-20T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-44004"
},
{
"cve": "CVE-2025-48731",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-48731"
}
],
"notes": [
{
"category": "general",
"text": "Mattermost Confluence Plugin version \u003c1.5.0 fails to check the access of the user to the Confluence space which allows attackers to edit a subscription for a Confluence space the user does not have access for via edit subscription endpoint.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-48731",
"url": "https://www.suse.com/security/cve/CVE-2025-48731"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-20T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-48731"
},
{
"cve": "CVE-2025-49221",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-49221"
}
],
"notes": [
{
"category": "general",
"text": "Mattermost Confluence Plugin version \u003c1.5.0 fails to enforce authentication of the user to the Mattermost instance which allows unauthenticated attackers to access subscription details without via API call to GET subscription endpoint.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-49221",
"url": "https://www.suse.com/security/cve/CVE-2025-49221"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-20T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2025-49221"
},
{
"cve": "CVE-2025-50946",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-50946"
}
],
"notes": [
{
"category": "general",
"text": "OS Command Injection in Olivetin 2025.4.22 Custom Themes via the ParseRequestURI function in service/internal/executor/arguments.go.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-50946",
"url": "https://www.suse.com/security/cve/CVE-2025-50946"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-20T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-50946"
},
{
"cve": "CVE-2025-52931",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-52931"
}
],
"notes": [
{
"category": "general",
"text": "Mattermost Confluence Plugin version \u003c1.5.0 fails to handle unexpected request body which allows attackers to crash the plugin via constant hit to update channel subscription endpoint with an invalid request body.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-52931",
"url": "https://www.suse.com/security/cve/CVE-2025-52931"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-20T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-52931"
},
{
"cve": "CVE-2025-53514",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-53514"
}
],
"notes": [
{
"category": "general",
"text": "Mattermost Confluence Plugin version \u003c1.5.0 fails to handle unexpected request body which allows attackers to crash the plugin via constant hit to server webhook endpoint with an invalid request body.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-53514",
"url": "https://www.suse.com/security/cve/CVE-2025-53514"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-20T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-53514"
},
{
"cve": "CVE-2025-53857",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-53857"
}
],
"notes": [
{
"category": "general",
"text": "Mattermost Confluence Plugin version \u003c1.5.0 fails to check the access of the user to the channel which allows attackers to get channel subscription details without proper access to the channel via API call to the GET autocomplete/GetChannelSubscriptions endpoint.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-53857",
"url": "https://www.suse.com/security/cve/CVE-2025-53857"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-20T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2025-53857"
},
{
"cve": "CVE-2025-53910",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-53910"
}
],
"notes": [
{
"category": "general",
"text": "Mattermost Confluence Plugin version \u003c1.5.0 fails to check the access of the user to the channel which allows attackers to create a channel subscription without proper access to the channel via API call to the edit channel subscription endpoint.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-53910",
"url": "https://www.suse.com/security/cve/CVE-2025-53910"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-20T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-53910"
},
{
"cve": "CVE-2025-54458",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-54458"
}
],
"notes": [
{
"category": "general",
"text": "Mattermost Confluence Plugin version \u003c1.5.0 fails to check the access of the user to the Confluence space which allows attackers to create a subscription for a Confluence space the user does not have access to via the create subscription endpoint.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-54458",
"url": "https://www.suse.com/security/cve/CVE-2025-54458"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-20T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-54458"
},
{
"cve": "CVE-2025-54463",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-54463"
}
],
"notes": [
{
"category": "general",
"text": "Mattermost Confluence Plugin version \u003c1.5.0 fails to handle unexpected request body which allows attackers to crash the plugin via constant hit to server webhook endpoint with an invalid request body.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-54463",
"url": "https://www.suse.com/security/cve/CVE-2025-54463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-20T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-54463"
},
{
"cve": "CVE-2025-54478",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-54478"
}
],
"notes": [
{
"category": "general",
"text": "Mattermost Confluence Plugin version \u003c1.5.0 fails to enforce authentication of the user to the Mattermost instance which allows unauthenticated attackers to edit channel subscriptions via API call to the edit channel subscription endpoint.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-54478",
"url": "https://www.suse.com/security/cve/CVE-2025-54478"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-20T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-54478"
},
{
"cve": "CVE-2025-54525",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-54525"
}
],
"notes": [
{
"category": "general",
"text": "Mattermost Confluence Plugin version \u003c1.5.0 fails to handle unexpected request body which allows attackers to crash the plugin via constant hit to create channel subscription endpoint with an invalid request body.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-54525",
"url": "https://www.suse.com/security/cve/CVE-2025-54525"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-20T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-54525"
},
{
"cve": "CVE-2025-55196",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-55196"
}
],
"notes": [
{
"category": "general",
"text": "External Secrets Operator is a Kubernetes operator that integrates external secret management systems. From version 0.15.0 to before 0.19.2, a vulnerability was discovered where the List() calls for Kubernetes Secret and SecretStore resources performed by the PushSecret controller did not apply a namespace selector. This flaw allowed an attacker to use label selectors to list and read secrets/secret-stores across the cluster, bypassing intended namespace restrictions. An attacker with the ability to create or update PushSecret resources and control SecretStore configurations could exploit this vulnerability to exfiltrate sensitive data from arbitrary namespaces. This could lead to full disclosure of Kubernetes secrets, including credentials, tokens, and other sensitive information stored in the cluster. This vulnerability has been patched in version 0.19.2. A workaround for this issue includes auditing and restricting RBAC permissions so that only trusted service accounts can create or update PushSecret and SecretStore resources.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-55196",
"url": "https://www.suse.com/security/cve/CVE-2025-55196"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-20T00:00:00Z",
"details": "not set"
}
],
"title": "CVE-2025-55196"
},
{
"cve": "CVE-2025-55198",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-55198"
}
],
"notes": [
{
"category": "general",
"text": "Helm is a package manager for Charts for Kubernetes. Prior to version 3.18.5, when parsing Chart.yaml and index.yaml files, an improper validation of type error can lead to a panic. This issue has been resolved in Helm 3.18.5. A workaround involves ensuring YAML files are formatted as Helm expects prior to processing them with Helm.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-55198",
"url": "https://www.suse.com/security/cve/CVE-2025-55198"
},
{
"category": "external",
"summary": "SUSE Bug 1248092 for CVE-2025-55198",
"url": "https://bugzilla.suse.com/1248092"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-20T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-55198"
},
{
"cve": "CVE-2025-55199",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-55199"
}
],
"notes": [
{
"category": "general",
"text": "Helm is a package manager for Charts for Kubernetes. Prior to version 3.18.5, it is possible to craft a JSON Schema file in a manner which could cause Helm to use all available memory and have an out of memory (OOM) termination. This issue has been resolved in Helm 3.18.5. A workaround involves ensuring all Helm charts that are being loaded into Helm do not have any reference of $ref pointing to /dev/zero.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-55199",
"url": "https://www.suse.com/security/cve/CVE-2025-55199"
},
{
"category": "external",
"summary": "SUSE Bug 1248093 for CVE-2025-55199",
"url": "https://bugzilla.suse.com/1248093"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-20T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-55199"
},
{
"cve": "CVE-2025-8285",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-8285"
}
],
"notes": [
{
"category": "general",
"text": "Mattermost Confluence Plugin version \u003c1.5.0 fails to check the access of the user to the channel which allows attackers to create channel subscription without proper access to the channel via API call to the create channel subscription endpoint.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-8285",
"url": "https://www.suse.com/security/cve/CVE-2025-8285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-20T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-8285"
},
{
"cve": "CVE-2025-9039",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-9039"
}
],
"notes": [
{
"category": "general",
"text": "We identified an issue in the Amazon ECS agent where, under certain conditions, an introspection server could be accessed off-host by another instance if the instances are in the same security group or if their security groups allow incoming connections that include the port where the server is hosted. This issue does not affect instances where the option to allow off-host access to the introspection server is set to \u0027false\u0027.\n\nThis issue has been addressed in ECS agent version 1.97.1. We recommend upgrading to the latest version and ensuring any forked or derivative code is patched to incorporate the new fixes. \n\nIf customers cannot update to the latest AMI, they can modify the Amazon EC2 security groups to restrict incoming access to the introspection server port (51678).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-9039",
"url": "https://www.suse.com/security/cve/CVE-2025-9039"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250818T190335-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-20T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-9039"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…