Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-9081 (GCVE-0-2025-9081)
Vulnerability from cvelistv5 – Published: 2025-09-19 19:36 – Updated: 2025-09-19 19:52
VLAI?
EPSS
Title
IDOR in board file download allows any user to download any file by UUID
Summary
Mattermost versions 10.5.x <= 10.5.8, 9.11.x <= 9.11.17 fail to properly validate access controls which allows any authenticated user to download sensitive files via board file download endpoint using UUID enumeration
Severity ?
CWE
- CWE-639 - Authorization Bypass Through User-Controlled Key
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Mattermost | Mattermost |
Affected:
10.5.0 , ≤ 10.5.8
(semver)
Affected: 9.11.0 , ≤ 9.11.17 (semver) Unaffected: 10.11.0 Unaffected: 10.5.9 Unaffected: 9.11.18 |
Credits
daw10
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-9081",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-09-19T19:51:48.729159Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-09-19T19:52:03.664Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Mattermost",
"vendor": "Mattermost",
"versions": [
{
"lessThanOrEqual": "10.5.8",
"status": "affected",
"version": "10.5.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.11.17",
"status": "affected",
"version": "9.11.0",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "10.11.0"
},
{
"status": "unaffected",
"version": "10.5.9"
},
{
"status": "unaffected",
"version": "9.11.18"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "daw10"
}
],
"descriptions": [
{
"lang": "en",
"value": "Mattermost versions 10.5.x \u003c= 10.5.8, 9.11.x \u003c= 9.11.17 fail to properly validate access controls which allows any authenticated user to download sensitive files via board file download endpoint using UUID enumeration"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-639",
"description": "CWE-639: Authorization Bypass Through User-Controlled Key",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-09-19T19:36:14.702Z",
"orgId": "9302f53e-dde5-4bf3-b2f2-a83f91ac0eee",
"shortName": "Mattermost"
},
"references": [
{
"url": "https://mattermost.com/security-updates"
}
],
"solutions": [
{
"lang": "en",
"value": "Update Mattermost to versions 10.11.0, 10.5.9, 9.11.18 or higher."
}
],
"source": {
"advisory": "MMSA-2025-00502",
"defect": [
"https://mattermost.atlassian.net/browse/MM-64659"
],
"discovery": "EXTERNAL"
},
"title": "IDOR in board file download allows any user to download any file by UUID"
}
},
"cveMetadata": {
"assignerOrgId": "9302f53e-dde5-4bf3-b2f2-a83f91ac0eee",
"assignerShortName": "Mattermost",
"cveId": "CVE-2025-9081",
"datePublished": "2025-09-19T19:36:14.702Z",
"dateReserved": "2025-08-15T15:45:37.336Z",
"dateUpdated": "2025-09-19T19:52:03.664Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-9081\",\"sourceIdentifier\":\"responsibledisclosure@mattermost.com\",\"published\":\"2025-09-19T20:15:40.807\",\"lastModified\":\"2025-09-25T20:14:59.717\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Mattermost versions 10.5.x \u003c= 10.5.8, 9.11.x \u003c= 9.11.17 fail to properly validate access controls which allows any authenticated user to download sensitive files via board file download endpoint using UUID enumeration\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"responsibledisclosure@mattermost.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N\",\"baseScore\":3.1,\"baseSeverity\":\"LOW\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.6,\"impactScore\":1.4},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"responsibledisclosure@mattermost.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-639\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.11.0\",\"versionEndExcluding\":\"9.11.17\",\"matchCriteriaId\":\"3F117291-CF45-4790-8BEB-E51DB0BAEF82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.5.0\",\"versionEndExcluding\":\"10.5.9\",\"matchCriteriaId\":\"B95DCAE5-07C2-46B1-B03E-ED3FB9B2C568\"}]}]}],\"references\":[{\"url\":\"https://mattermost.com/security-updates\",\"source\":\"responsibledisclosure@mattermost.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-9081\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-09-19T19:51:48.729159Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-09-19T19:51:53.830Z\"}}], \"cna\": {\"title\": \"IDOR in board file download allows any user to download any file by UUID\", \"source\": {\"defect\": [\"https://mattermost.atlassian.net/browse/MM-64659\"], \"advisory\": \"MMSA-2025-00502\", \"discovery\": \"EXTERNAL\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"daw10\"}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 3.1, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"LOW\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"LOW\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Mattermost\", \"product\": \"Mattermost\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.5.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"10.5.8\"}, {\"status\": \"affected\", \"version\": \"9.11.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"9.11.17\"}, {\"status\": \"unaffected\", \"version\": \"10.11.0\"}, {\"status\": \"unaffected\", \"version\": \"10.5.9\"}, {\"status\": \"unaffected\", \"version\": \"9.11.18\"}], \"defaultStatus\": \"unaffected\"}], \"solutions\": [{\"lang\": \"en\", \"value\": \"Update Mattermost to versions 10.11.0, 10.5.9, 9.11.18 or higher.\"}], \"references\": [{\"url\": \"https://mattermost.com/security-updates\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Mattermost versions 10.5.x \u003c= 10.5.8, 9.11.x \u003c= 9.11.17 fail to properly validate access controls which allows any authenticated user to download sensitive files via board file download endpoint using UUID enumeration\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-639\", \"description\": \"CWE-639: Authorization Bypass Through User-Controlled Key\"}]}], \"providerMetadata\": {\"orgId\": \"9302f53e-dde5-4bf3-b2f2-a83f91ac0eee\", \"shortName\": \"Mattermost\", \"dateUpdated\": \"2025-09-19T19:36:14.702Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-9081\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-09-19T19:52:03.664Z\", \"dateReserved\": \"2025-08-15T15:45:37.336Z\", \"assignerOrgId\": \"9302f53e-dde5-4bf3-b2f2-a83f91ac0eee\", \"datePublished\": \"2025-09-19T19:36:14.702Z\", \"assignerShortName\": \"Mattermost\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
GHSA-F72G-52V7-MG3P
Vulnerability from github – Published: 2025-09-19 21:31 – Updated: 2025-09-26 16:23
VLAI?
Summary
Mattermost boards plugin fails to restrict download access to files
Details
Mattermost versions 10.5.x <= 10.5.8, 9.11.x <= 9.11.17 fail to properly validate access controls which allows any authenticated user to download sensitive files via board file download endpoint using UUID enumeration
Severity ?
{
"affected": [
{
"package": {
"ecosystem": "Go",
"name": "github.com/mattermost/mattermost-plugin-boards"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.0.0-20250716054606-3f3e3becfe1d"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Go",
"name": "github.com/mattermost/mattermost/server/v8"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.0-20250721095935-11c36f4d1e44"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Go",
"name": "github.com/mattermost/mattermost-server"
},
"ranges": [
{
"events": [
{
"introduced": "10.5.0-rc1"
},
{
"fixed": "10.5.9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Go",
"name": "github.com/mattermost/mattermost-server"
},
"ranges": [
{
"events": [
{
"introduced": "9.11.0-rc1"
},
{
"fixed": "9.11.18"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2025-9081"
],
"database_specific": {
"cwe_ids": [
"CWE-639"
],
"github_reviewed": true,
"github_reviewed_at": "2025-09-22T18:00:01Z",
"nvd_published_at": "2025-09-19T20:15:40Z",
"severity": "LOW"
},
"details": "Mattermost versions 10.5.x \u003c= 10.5.8, 9.11.x \u003c= 9.11.17 fail to properly validate access controls which allows any authenticated user to download sensitive files via board file download endpoint using UUID enumeration",
"id": "GHSA-f72g-52v7-mg3p",
"modified": "2025-09-26T16:23:18Z",
"published": "2025-09-19T21:31:21Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-9081"
},
{
"type": "WEB",
"url": "https://github.com/mattermost/mattermost-plugin-boards/pull/114"
},
{
"type": "WEB",
"url": "https://github.com/mattermost/mattermost-plugin-boards/commit/3f3e3becfe1d66db0d0f4fd235f04afd6e1ec40b"
},
{
"type": "PACKAGE",
"url": "https://github.com/mattermost/mattermost-plugin-boards"
},
{
"type": "WEB",
"url": "https://mattermost.com/security-updates"
},
{
"type": "WEB",
"url": "https://pkg.go.dev/vuln/GO-2025-3978"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
"type": "CVSS_V3"
}
],
"summary": "Mattermost boards plugin fails to restrict download access to files"
}
FKIE_CVE-2025-9081
Vulnerability from fkie_nvd - Published: 2025-09-19 20:15 - Updated: 2025-09-25 20:14
Severity ?
3.1 (Low) - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
Mattermost versions 10.5.x <= 10.5.8, 9.11.x <= 9.11.17 fail to properly validate access controls which allows any authenticated user to download sensitive files via board file download endpoint using UUID enumeration
References
| URL | Tags | ||
|---|---|---|---|
| responsibledisclosure@mattermost.com | https://mattermost.com/security-updates | Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| mattermost | mattermost_server | * | |
| mattermost | mattermost_server | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3F117291-CF45-4790-8BEB-E51DB0BAEF82",
"versionEndExcluding": "9.11.17",
"versionStartIncluding": "9.11.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B95DCAE5-07C2-46B1-B03E-ED3FB9B2C568",
"versionEndExcluding": "10.5.9",
"versionStartIncluding": "10.5.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Mattermost versions 10.5.x \u003c= 10.5.8, 9.11.x \u003c= 9.11.17 fail to properly validate access controls which allows any authenticated user to download sensitive files via board file download endpoint using UUID enumeration"
}
],
"id": "CVE-2025-9081",
"lastModified": "2025-09-25T20:14:59.717",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.6,
"impactScore": 1.4,
"source": "responsibledisclosure@mattermost.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2025-09-19T20:15:40.807",
"references": [
{
"source": "responsibledisclosure@mattermost.com",
"tags": [
"Vendor Advisory"
],
"url": "https://mattermost.com/security-updates"
}
],
"sourceIdentifier": "responsibledisclosure@mattermost.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-639"
}
],
"source": "responsibledisclosure@mattermost.com",
"type": "Secondary"
}
]
}
CERTFR-2025-AVI-0707
Vulnerability from certfr_avis - Published: 2025-08-18 - Updated: 2025-09-16
De multiples vulnérabilités ont été découvertes dans Mattermost Server. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, un contournement de la politique de sécurité et un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Impacted products
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Mattermost | Mattermost Server | Mattermost Server versions 10.10.x antérieures à 10.10.2 | ||
| Mattermost | Mattermost Server | Mattermost Server versions 10.5.x antérieures à 10.5.10 | ||
| Mattermost | Mattermost Server | Mattermost Server versions 10.9.x antérieures à 10.9.5 | ||
| Mattermost | Mattermost Server | Mattermost Server versions 10.8.x antérieures à 10.8.4 | ||
| Mattermost | Mattermost Server | Mattermost Server versions 9.11.x antérieures à 9.11.18 |
References
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Mattermost Server versions 10.10.x ant\u00e9rieures \u00e0 10.10.2",
"product": {
"name": "Mattermost Server",
"vendor": {
"name": "Mattermost",
"scada": false
}
}
},
{
"description": "Mattermost Server versions 10.5.x ant\u00e9rieures \u00e0 10.5.10",
"product": {
"name": "Mattermost Server",
"vendor": {
"name": "Mattermost",
"scada": false
}
}
},
{
"description": "Mattermost Server versions 10.9.x ant\u00e9rieures \u00e0 10.9.5",
"product": {
"name": "Mattermost Server",
"vendor": {
"name": "Mattermost",
"scada": false
}
}
},
{
"description": "Mattermost Server versions 10.8.x ant\u00e9rieures \u00e0 10.8.4",
"product": {
"name": "Mattermost Server",
"vendor": {
"name": "Mattermost",
"scada": false
}
}
},
{
"description": "Mattermost Server versions 9.11.x ant\u00e9rieures \u00e0 9.11.18",
"product": {
"name": "Mattermost Server",
"vendor": {
"name": "Mattermost",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-9078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9078"
},
{
"name": "CVE-2025-9081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9081"
},
{
"name": "CVE-2025-9079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9079"
},
{
"name": "CVE-2025-9076",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9076"
},
{
"name": "CVE-2025-9084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9084"
},
{
"name": "CVE-2025-9072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9072"
}
],
"initial_release_date": "2025-08-18T00:00:00",
"last_revision_date": "2025-09-16T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0707",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-08-18T00:00:00.000000"
},
{
"description": "Ajout des r\u00e9f\u00e9rences CVE",
"revision_date": "2025-09-16T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Mattermost Server. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, un contournement de la politique de s\u00e9curit\u00e9 et un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Mattermost Server",
"vendor_advisories": [
{
"published_at": "2025-08-15",
"title": "Bulletin de s\u00e9curit\u00e9 Mattermost MMSA-2025-00495",
"url": "https://mattermost.com/security-updates/"
},
{
"published_at": "2025-08-15",
"title": "Bulletin de s\u00e9curit\u00e9 Mattermost MMSA-2025-00503",
"url": "https://mattermost.com/security-updates/"
},
{
"published_at": "2025-08-15",
"title": "Bulletin de s\u00e9curit\u00e9 Mattermost MMSA-2025-00511",
"url": "https://mattermost.com/security-updates/"
},
{
"published_at": "2025-08-15",
"title": "Bulletin de s\u00e9curit\u00e9 Mattermost MMSA-2025-00513",
"url": "https://mattermost.com/security-updates/"
},
{
"published_at": "2025-08-15",
"title": "Bulletin de s\u00e9curit\u00e9 Mattermost MMSA-2025-00502",
"url": "https://mattermost.com/security-updates/"
},
{
"published_at": "2025-08-15",
"title": "Bulletin de s\u00e9curit\u00e9 Mattermost MMSA-2025-00509",
"url": "https://mattermost.com/security-updates/"
}
]
}
OPENSUSE-SU-2025:15576-1
Vulnerability from csaf_opensuse - Published: 2025-09-25 00:00 - Updated: 2025-09-25 00:00Summary
govulncheck-vulndb-0.0.20250924T192141-1.1 on GA media
Severity
Moderate
Notes
Title of the patch: govulncheck-vulndb-0.0.20250924T192141-1.1 on GA media
Description of the patch: These are all security issues fixed in the govulncheck-vulndb-0.0.20250924T192141-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames: openSUSE-Tumbleweed-2025-15576
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.1 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.2 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "govulncheck-vulndb-0.0.20250924T192141-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the govulncheck-vulndb-0.0.20250924T192141-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15576",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15576-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-10630 page",
"url": "https://www.suse.com/security/cve/CVE-2025-10630/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-59341 page",
"url": "https://www.suse.com/security/cve/CVE-2025-59341/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-59342 page",
"url": "https://www.suse.com/security/cve/CVE-2025-59342/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-59345 page",
"url": "https://www.suse.com/security/cve/CVE-2025-59345/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-59346 page",
"url": "https://www.suse.com/security/cve/CVE-2025-59346/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-59347 page",
"url": "https://www.suse.com/security/cve/CVE-2025-59347/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-59348 page",
"url": "https://www.suse.com/security/cve/CVE-2025-59348/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-59349 page",
"url": "https://www.suse.com/security/cve/CVE-2025-59349/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-59350 page",
"url": "https://www.suse.com/security/cve/CVE-2025-59350/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-59351 page",
"url": "https://www.suse.com/security/cve/CVE-2025-59351/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-59352 page",
"url": "https://www.suse.com/security/cve/CVE-2025-59352/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-59353 page",
"url": "https://www.suse.com/security/cve/CVE-2025-59353/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-59354 page",
"url": "https://www.suse.com/security/cve/CVE-2025-59354/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-59410 page",
"url": "https://www.suse.com/security/cve/CVE-2025-59410/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-9079 page",
"url": "https://www.suse.com/security/cve/CVE-2025-9079/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-9081 page",
"url": "https://www.suse.com/security/cve/CVE-2025-9081/"
}
],
"title": "govulncheck-vulndb-0.0.20250924T192141-1.1 on GA media",
"tracking": {
"current_release_date": "2025-09-25T00:00:00Z",
"generator": {
"date": "2025-09-25T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15576-1",
"initial_release_date": "2025-09-25T00:00:00Z",
"revision_history": [
{
"date": "2025-09-25T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "govulncheck-vulndb-0.0.20250924T192141-1.1.aarch64",
"product": {
"name": "govulncheck-vulndb-0.0.20250924T192141-1.1.aarch64",
"product_id": "govulncheck-vulndb-0.0.20250924T192141-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "govulncheck-vulndb-0.0.20250924T192141-1.1.ppc64le",
"product": {
"name": "govulncheck-vulndb-0.0.20250924T192141-1.1.ppc64le",
"product_id": "govulncheck-vulndb-0.0.20250924T192141-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "govulncheck-vulndb-0.0.20250924T192141-1.1.s390x",
"product": {
"name": "govulncheck-vulndb-0.0.20250924T192141-1.1.s390x",
"product_id": "govulncheck-vulndb-0.0.20250924T192141-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "govulncheck-vulndb-0.0.20250924T192141-1.1.x86_64",
"product": {
"name": "govulncheck-vulndb-0.0.20250924T192141-1.1.x86_64",
"product_id": "govulncheck-vulndb-0.0.20250924T192141-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "govulncheck-vulndb-0.0.20250924T192141-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.aarch64"
},
"product_reference": "govulncheck-vulndb-0.0.20250924T192141-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "govulncheck-vulndb-0.0.20250924T192141-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.ppc64le"
},
"product_reference": "govulncheck-vulndb-0.0.20250924T192141-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "govulncheck-vulndb-0.0.20250924T192141-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.s390x"
},
"product_reference": "govulncheck-vulndb-0.0.20250924T192141-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "govulncheck-vulndb-0.0.20250924T192141-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.x86_64"
},
"product_reference": "govulncheck-vulndb-0.0.20250924T192141-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-10630",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-10630"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. Grafana-Zabbix is a plugin for Grafana allowing to visualize monitoring data from Zabbix and create dashboards for analyzing metrics and realtime monitoring. \n\n\n\nVersions 5.2.1 and below contained a ReDoS vulnerability via user-supplied regex query which could causes CPU usage to max out. This vulnerability is fixed in version 6.0.0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-10630",
"url": "https://www.suse.com/security/cve/CVE-2025-10630"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-09-25T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-10630"
},
{
"cve": "CVE-2025-59341",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-59341"
}
],
"notes": [
{
"category": "general",
"text": "esm.sh is a nobuild content delivery network(CDN) for modern web development. In 136 and earlier, a Local File Inclusion (LFI) issue was identified in the esm.sh service URL handling. An attacker could craft a request that causes the server to read and return files from the host filesystem (or other unintended file sources).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-59341",
"url": "https://www.suse.com/security/cve/CVE-2025-59341"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-09-25T00:00:00Z",
"details": "not set"
}
],
"title": "CVE-2025-59341"
},
{
"cve": "CVE-2025-59342",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-59342"
}
],
"notes": [
{
"category": "general",
"text": "esm.sh is a nobuild content delivery network(CDN) for modern web development. In 136 and earlier, a path-traversal flaw in the handling of the X-Zone-Id HTTP header allows an attacker to cause the application to write files outside the intended storage location. The header value is used to build a filesystem path but is not properly canonicalized or restricted to the application\u0027s storage base directory. As a result, supplying ../ sequences in X-Zone-Id causes files to be written to arbitrary directories.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-59342",
"url": "https://www.suse.com/security/cve/CVE-2025-59342"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-09-25T00:00:00Z",
"details": "not set"
}
],
"title": "CVE-2025-59342"
},
{
"cve": "CVE-2025-59345",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-59345"
}
],
"notes": [
{
"category": "general",
"text": "Dragonfly is an open source P2P-based file distribution and image acceleration system. Prior to 2.1.0, The /api/v1/jobs and /preheats endpoints in Manager web UI are accessible without authentication. Any user with network access to the Manager can create, delete, and modify jobs, and create preheat jobs. An unauthenticated adversary with network access to a Manager web UI uses /api/v1/jobs endpoint to create hundreds of useless jobs. The Manager is in a denial-of-service state, and stops accepting requests from valid administrators. This vulnerability is fixed in 2.1.0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-59345",
"url": "https://www.suse.com/security/cve/CVE-2025-59345"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-09-25T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2025-59345"
},
{
"cve": "CVE-2025-59346",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-59346"
}
],
"notes": [
{
"category": "general",
"text": "Dragonfly is an open source P2P-based file distribution and image acceleration system. Versions prior to 2.1.0 contain a server-side request forgery (SSRF) vulnerability that enables users to force DragonFly2\u0027s components to make requests to internal services that are otherwise not accessible to them. The issue arises because the Manager API accepts a user-supplied URL when creating a Preheat job with weak validation, peers can trigger other peers to fetch an arbitrary URL through pieceManager.DownloadSource, and internal HTTP clients follow redirects, allowing a request to a malicious server to be redirected to internal services. This can be used to probe or access internal HTTP endpoints. The vulnerability is fixed in version 2.1.0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-59346",
"url": "https://www.suse.com/security/cve/CVE-2025-59346"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-09-25T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-59346"
},
{
"cve": "CVE-2025-59347",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-59347"
}
],
"notes": [
{
"category": "general",
"text": "Dragonfly is an open source P2P-based file distribution and image acceleration system. Prior to 2.1.0, The Manager disables TLS certificate verification in HTTP clients. The clients are not configurable, so users have no way to re-enable the verification. A Manager processes dozens of preheat jobs. An adversary performs a network-level Man-in-the-Middle attack, providing invalid data to the Manager. The Manager preheats with the wrong data, which later causes a denial of service and file integrity problems. This vulnerability is fixed in 2.1.0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-59347",
"url": "https://www.suse.com/security/cve/CVE-2025-59347"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-09-25T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-59347"
},
{
"cve": "CVE-2025-59348",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-59348"
}
],
"notes": [
{
"category": "general",
"text": "Dragonfly is an open source P2P-based file distribution and image acceleration system. Prior to 2.1.0, the processPieceFromSource method does not update the structure\u0027s usedTraffic field, because an uninitialized variable n is used as a guard to the AddTraffic method call, instead of the result.Size variable. A task is processed by a peer. The usedTraffic metadata is not updated during the processing. Rate limiting is incorrectly applied, leading to a denial-of-service condition for the peer. This vulnerability is fixed in 2.1.0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-59348",
"url": "https://www.suse.com/security/cve/CVE-2025-59348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-09-25T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-59348"
},
{
"cve": "CVE-2025-59349",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-59349"
}
],
"notes": [
{
"category": "general",
"text": "Dragonfly is an open source P2P-based file distribution and image acceleration system. Prior to 2.1.0, DragonFly2 uses the os.MkdirAll function to create certain directory paths with specific access permissions. This function does not perform any permission checks when a given directory path already exists. This allows a local attacker to create a directory to be used later by DragonFly2 with broad permissions before DragonFly2 does so, potentially allowing the attacker to tamper with the files. This vulnerability is fixed in 2.1.0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-59349",
"url": "https://www.suse.com/security/cve/CVE-2025-59349"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-09-25T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2025-59349"
},
{
"cve": "CVE-2025-59350",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-59350"
}
],
"notes": [
{
"category": "general",
"text": "Dragonfly is an open source P2P-based file distribution and image acceleration system. Prior to 2.1.0, the access control mechanism for the Proxy feature uses simple string comparisons and is therefore vulnerable to timing attacks. An attacker may try to guess the password one character at a time by sending all possible characters to a vulnerable mechanism and measuring the comparison instruction\u0027s execution times. This vulnerability is fixed in 2.1.0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-59350",
"url": "https://www.suse.com/security/cve/CVE-2025-59350"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-09-25T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-59350"
},
{
"cve": "CVE-2025-59351",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-59351"
}
],
"notes": [
{
"category": "general",
"text": "Dragonfly is an open source P2P-based file distribution and image acceleration system. Prior to 2.1.0, the first return value of a function is dereferenced even when the function returns an error. This can result in a nil dereference, and cause code to panic. This vulnerability is fixed in 2.1.0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-59351",
"url": "https://www.suse.com/security/cve/CVE-2025-59351"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-09-25T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-59351"
},
{
"cve": "CVE-2025-59352",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-59352"
}
],
"notes": [
{
"category": "general",
"text": "Dragonfly is an open source P2P-based file distribution and image acceleration system. Prior to 2.1.0, the gRPC API and HTTP APIs allow peers to send requests that force the recipient peer to create files in arbitrary file system locations, and to read arbitrary files. This allows peers to steal other peers\u0027 secret data and to gain remote code execution (RCE) capabilities on the peer\u0027s machine.This vulnerability is fixed in 2.1.0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-59352",
"url": "https://www.suse.com/security/cve/CVE-2025-59352"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-09-25T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2025-59352"
},
{
"cve": "CVE-2025-59353",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-59353"
}
],
"notes": [
{
"category": "general",
"text": "Dragonfly is an open source P2P-based file distribution and image acceleration system. Prior to 2.1.0, a peer can obtain a valid TLS certificate for arbitrary IP addresses, effectively rendering the mTLS authentication useless. The issue is that the Manager\u0027s Certificate gRPC service does not validate if the requested IP addresses \"belong to\" the peer requesting the certificate-that is, if the peer connects from the same IP address as the one provided in the certificate request. This vulnerability is fixed in 2.1.0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-59353",
"url": "https://www.suse.com/security/cve/CVE-2025-59353"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-09-25T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-59353"
},
{
"cve": "CVE-2025-59354",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-59354"
}
],
"notes": [
{
"category": "general",
"text": "Dragonfly is an open source P2P-based file distribution and image acceleration system. Prior to 2.1.0, the DragonFly2 uses a variety of hash functions, including the MD5 hash, for downloaded files. This allows attackers to replace files with malicious ones that have a colliding hash. This vulnerability is fixed in 2.1.0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-59354",
"url": "https://www.suse.com/security/cve/CVE-2025-59354"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-09-25T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-59354"
},
{
"cve": "CVE-2025-59410",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-59410"
}
],
"notes": [
{
"category": "general",
"text": "Dragonfly is an open source P2P-based file distribution and image acceleration system. Prior to 2.1.0, the code in the scheduler for downloading a tiny file is hard coded to use the HTTP protocol, rather than HTTPS. This means that an attacker could perform a Man-in-the-Middle attack, changing the network request so that a different piece of data gets downloaded. This vulnerability is fixed in 2.1.0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-59410",
"url": "https://www.suse.com/security/cve/CVE-2025-59410"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-09-25T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-59410"
},
{
"cve": "CVE-2025-9079",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-9079"
}
],
"notes": [
{
"category": "general",
"text": "Mattermost versions 10.8.x \u003c= 10.8.3, 10.5.x \u003c= 10.5.8, 9.11.x \u003c= 9.11.17, 10.10.x \u003c= 10.10.1, 10.9.x \u003c= 10.9.3 fail to validate import directory path configuration which allows admin users to execute arbitrary code via malicious plugin upload to prepackaged plugins directory",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-9079",
"url": "https://www.suse.com/security/cve/CVE-2025-9079"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-09-25T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-9079"
},
{
"cve": "CVE-2025-9081",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-9081"
}
],
"notes": [
{
"category": "general",
"text": "Mattermost versions 10.5.x \u003c= 10.5.8, 9.11.x \u003c= 9.11.17 fail to properly validate access controls which allows any authenticated user to download sensitive files via board file download endpoint using UUID enumeration",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-9081",
"url": "https://www.suse.com/security/cve/CVE-2025-9081"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250924T192141-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-09-25T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-9081"
}
]
}
WID-SEC-W-2025-1856
Vulnerability from csaf_certbund - Published: 2025-08-17 22:00 - Updated: 2025-09-22 22:00Summary
Mattermost Server: Mehrere Schwachstellen
Severity
Hoch
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: Mattermost ist ein webbasierter Instant-Messaging-Dienst.
Angriff: Ein Angreifer kann mehrere Schwachstellen in Mattermost Server ausnutzen, um Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen oder Code auszuführen.
Betroffene Betriebssysteme: - Linux
- Sonstiges
- UNIX
- Windows
References
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Mattermost ist ein webbasierter Instant-Messaging-Dienst.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Mattermost Server ausnutzen, um Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen oder Code auszuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-1856 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1856.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-1856 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1856"
},
{
"category": "external",
"summary": "Mattermost Security Updates vom 2025-08-17",
"url": "https://mattermost.com/security-updates/#server"
}
],
"source_lang": "en-US",
"title": "Mattermost Server: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-09-22T22:00:00.000+00:00",
"generator": {
"date": "2025-09-23T06:26:09.791+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2025-1856",
"initial_release_date": "2025-08-17T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-08-17T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-09-15T22:00:00.000+00:00",
"number": "2",
"summary": "CVE\u0027s erg\u00e4nzt, Beschreibung aktualisiert"
},
{
"date": "2025-09-22T22:00:00.000+00:00",
"number": "3",
"summary": "CVEs erg\u00e4nzt, Beschreibung und Bewertung angepasst"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "Servr \u003c10.11.0",
"product": {
"name": "Mattermost Mattermost Servr \u003c10.11.0",
"product_id": "T046305"
}
},
{
"category": "product_version",
"name": "Servr 10.11.0",
"product": {
"name": "Mattermost Mattermost Servr 10.11.0",
"product_id": "T046305-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:mattermost:mattermost_server:servr__10.11.0"
}
}
},
{
"category": "product_version_range",
"name": "Servr \u003c10.10.2",
"product": {
"name": "Mattermost Mattermost Servr \u003c10.10.2",
"product_id": "T046306"
}
},
{
"category": "product_version",
"name": "Servr 10.10.2",
"product": {
"name": "Mattermost Mattermost Servr 10.10.2",
"product_id": "T046306-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:mattermost:mattermost_server:servr__10.10.2"
}
}
},
{
"category": "product_version_range",
"name": "Servr \u003c10.5.10",
"product": {
"name": "Mattermost Mattermost Servr \u003c10.5.10",
"product_id": "T046307"
}
},
{
"category": "product_version",
"name": "Servr 10.5.10",
"product": {
"name": "Mattermost Mattermost Servr 10.5.10",
"product_id": "T046307-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:mattermost:mattermost_server:servr__10.5.10"
}
}
},
{
"category": "product_version_range",
"name": "Servr \u003c10.9.5",
"product": {
"name": "Mattermost Mattermost Servr \u003c10.9.5",
"product_id": "T046308"
}
},
{
"category": "product_version",
"name": "Servr 10.9.5",
"product": {
"name": "Mattermost Mattermost Servr 10.9.5",
"product_id": "T046308-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:mattermost:mattermost_server:servr__10.9.5"
}
}
},
{
"category": "product_version_range",
"name": "Servr \u003c10.8.4",
"product": {
"name": "Mattermost Mattermost Servr \u003c10.8.4",
"product_id": "T046309"
}
},
{
"category": "product_version",
"name": "Servr 10.8.4",
"product": {
"name": "Mattermost Mattermost Servr 10.8.4",
"product_id": "T046309-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:mattermost:mattermost_server:servr__10.8.4"
}
}
},
{
"category": "product_version_range",
"name": "Servr \u003c10.5.9",
"product": {
"name": "Mattermost Mattermost Servr \u003c10.5.9",
"product_id": "T046310"
}
},
{
"category": "product_version",
"name": "Servr 10.5.9",
"product": {
"name": "Mattermost Mattermost Servr 10.5.9",
"product_id": "T046310-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:mattermost:mattermost_server:servr__10.5.9"
}
}
},
{
"category": "product_version_range",
"name": "Servr \u003c9.11.18",
"product": {
"name": "Mattermost Mattermost Servr \u003c9.11.18",
"product_id": "T046311"
}
},
{
"category": "product_version",
"name": "Servr 9.11.18",
"product": {
"name": "Mattermost Mattermost Servr 9.11.18",
"product_id": "T046311-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:mattermost:mattermost_server:servr__9.11.18"
}
}
},
{
"category": "product_version_range",
"name": "Servr \u003c10.9.4",
"product": {
"name": "Mattermost Mattermost Servr \u003c10.9.4",
"product_id": "T046312"
}
},
{
"category": "product_version",
"name": "Servr 10.9.4",
"product": {
"name": "Mattermost Mattermost Servr 10.9.4",
"product_id": "T046312-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:mattermost:mattermost_server:servr__10.9.4"
}
}
}
],
"category": "product_name",
"name": "Mattermost"
}
],
"category": "vendor",
"name": "Mattermost"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-9072",
"product_status": {
"known_affected": [
"T046305",
"T046306",
"T046309",
"T046307",
"T046308",
"T046312",
"T046310",
"T046311"
]
},
"release_date": "2025-08-17T22:00:00.000+00:00",
"title": "CVE-2025-9072"
},
{
"cve": "CVE-2025-9076",
"product_status": {
"known_affected": [
"T046305",
"T046306",
"T046309",
"T046307",
"T046308",
"T046312",
"T046310",
"T046311"
]
},
"release_date": "2025-08-17T22:00:00.000+00:00",
"title": "CVE-2025-9076"
},
{
"cve": "CVE-2025-9078",
"product_status": {
"known_affected": [
"T046305",
"T046306",
"T046309",
"T046307",
"T046308",
"T046312",
"T046310",
"T046311"
]
},
"release_date": "2025-08-17T22:00:00.000+00:00",
"title": "CVE-2025-9078"
},
{
"cve": "CVE-2025-9081",
"product_status": {
"known_affected": [
"T046305",
"T046306",
"T046309",
"T046307",
"T046308",
"T046312",
"T046310",
"T046311"
]
},
"release_date": "2025-08-17T22:00:00.000+00:00",
"title": "CVE-2025-9081"
},
{
"cve": "CVE-2025-9084",
"product_status": {
"known_affected": [
"T046305",
"T046306",
"T046309",
"T046307",
"T046308",
"T046312",
"T046310",
"T046311"
]
},
"release_date": "2025-08-17T22:00:00.000+00:00",
"title": "CVE-2025-9084"
},
{
"cve": "CVE-2025-9079",
"product_status": {
"known_affected": [
"T046305",
"T046306",
"T046309",
"T046307",
"T046308",
"T046312",
"T046310",
"T046311"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-9079"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…