Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CERTFR-2025-AVI-0614
Vulnerability from certfr_avis - Published: 2025-07-23 - Updated: 2025-08-21
Une vulnérabilité a été découverte dans Mattermost Server. Elle permet à un attaquant de provoquer une atteinte à la confidentialité des données, un contournement de la politique de sécurité et un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Impacted products
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Mattermost | Mattermost Server | Mattermost Server versions 10.10.x antérieures à 10.10.1 | ||
| Mattermost | Mattermost Server | Mattermost Server versions 10.8.x antérieures à 10.8.4 | ||
| Mattermost | Mattermost Server | Mattermost Server versions 10.5.x antérieures à 10.5.9 | ||
| Mattermost | Mattermost Server | Mattermost Server versions 9.11.x antérieures à 9.11.18 | ||
| Mattermost | Mattermost Server | Mattermost Server versions 10.9.x antérieures à 10.9.4 |
References
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Mattermost Server versions 10.10.x ant\u00e9rieures \u00e0 10.10.1",
"product": {
"name": "Mattermost Server",
"vendor": {
"name": "Mattermost",
"scada": false
}
}
},
{
"description": "Mattermost Server versions 10.8.x ant\u00e9rieures \u00e0 10.8.4",
"product": {
"name": "Mattermost Server",
"vendor": {
"name": "Mattermost",
"scada": false
}
}
},
{
"description": "Mattermost Server versions 10.5.x ant\u00e9rieures \u00e0 10.5.9",
"product": {
"name": "Mattermost Server",
"vendor": {
"name": "Mattermost",
"scada": false
}
}
},
{
"description": "Mattermost Server versions 9.11.x ant\u00e9rieures \u00e0 9.11.18",
"product": {
"name": "Mattermost Server",
"vendor": {
"name": "Mattermost",
"scada": false
}
}
},
{
"description": "Mattermost Server versions 10.9.x ant\u00e9rieures \u00e0 10.9.4",
"product": {
"name": "Mattermost Server",
"vendor": {
"name": "Mattermost",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-53971",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53971"
},
{
"name": "CVE-2025-49810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49810"
},
{
"name": "CVE-2025-47870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47870"
},
{
"name": "CVE-2025-36530",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36530"
},
{
"name": "CVE-2025-8023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8023"
},
{
"name": "CVE-2025-49222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49222"
},
{
"name": "CVE-2025-6465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6465"
}
],
"initial_release_date": "2025-07-23T00:00:00",
"last_revision_date": "2025-08-21T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0614",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-23T00:00:00.000000"
},
{
"description": "Ajout des r\u00e9f\u00e9rences CVE",
"revision_date": "2025-08-21T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Mattermost Server. Elle permet \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, un contournement de la politique de s\u00e9curit\u00e9 et un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Mattermost",
"vendor_advisories": [
{
"published_at": "2025-07-22",
"title": "Bulletin de s\u00e9curit\u00e9 Mattermost MMSA-2025-00501",
"url": "https://mattermost.com/security-updates/"
},
{
"published_at": "2025-07-22",
"title": "Bulletin de s\u00e9curit\u00e9 Mattermost MMSA-2025-00499",
"url": "https://mattermost.com/security-updates/"
},
{
"published_at": "2025-07-22",
"title": "Bulletin de s\u00e9curit\u00e9 Mattermost MMSA-2025-00505",
"url": "https://mattermost.com/security-updates/"
},
{
"published_at": "2025-07-22",
"title": "Bulletin de s\u00e9curit\u00e9 Mattermost MMSA-2025-00470",
"url": "https://mattermost.com/security-updates/"
},
{
"published_at": "2025-07-22",
"title": "Bulletin de s\u00e9curit\u00e9 Mattermost MMSA-2025-00498",
"url": "https://mattermost.com/security-updates/"
},
{
"published_at": "2025-07-22",
"title": "Bulletin de s\u00e9curit\u00e9 Mattermost MMSA-2025-00485",
"url": "https://mattermost.com/security-updates/"
},
{
"published_at": "2025-07-22",
"title": "Bulletin de s\u00e9curit\u00e9 Mattermost MMSA-2025-00500",
"url": "https://mattermost.com/security-updates/"
}
]
}
CVE-2025-49810 (GCVE-0-2025-49810)
Vulnerability from cvelistv5 – Published: 2025-08-21 07:15 – Updated: 2025-08-21 13:49
VLAI?
EPSS
Title
Thread summarization allows persistent access to channel
Summary
Mattermost versions 10.5.x <= 10.5.8 fail to validate access controls at time of access which allows user to read a thread via AI posts
Severity ?
CWE
- CWE-863 - Incorrect Authorization
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Mattermost | Mattermost |
Affected:
10.5.0 , ≤ 10.5.8
(semver)
Unaffected: 10.10.0 Unaffected: 10.5.9 |
Credits
Juho Forsén
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-49810",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-21T13:48:57.846939Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-08-21T13:49:24.983Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Mattermost",
"vendor": "Mattermost",
"versions": [
{
"lessThanOrEqual": "10.5.8",
"status": "affected",
"version": "10.5.0",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "10.10.0"
},
{
"status": "unaffected",
"version": "10.5.9"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Juho Fors\u00e9n"
}
],
"descriptions": [
{
"lang": "en",
"value": "Mattermost versions 10.5.x \u003c= 10.5.8 fail to validate access controls at time of access which allows user to read a thread via AI posts"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-863",
"description": "CWE-863: Incorrect Authorization",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-21T07:15:27.928Z",
"orgId": "9302f53e-dde5-4bf3-b2f2-a83f91ac0eee",
"shortName": "Mattermost"
},
"references": [
{
"url": "https://mattermost.com/security-updates"
}
],
"solutions": [
{
"lang": "en",
"value": "Update Mattermost to versions 10.10.0, 10.5.9 or higher."
}
],
"source": {
"advisory": "MMSA-2025-00470",
"defect": [
"https://mattermost.atlassian.net/browse/MM-63770"
],
"discovery": "{\"self\"=\u003e\"https://mattermost.atlassian.net/rest/api/2/customFieldOption/10557\", \"value\"=\u003e\"Internal\", \"id\"=\u003e\"10557\"}"
},
"title": "Thread summarization allows persistent access to channel"
}
},
"cveMetadata": {
"assignerOrgId": "9302f53e-dde5-4bf3-b2f2-a83f91ac0eee",
"assignerShortName": "Mattermost",
"cveId": "CVE-2025-49810",
"datePublished": "2025-08-21T07:15:27.928Z",
"dateReserved": "2025-07-22T07:53:00.876Z",
"dateUpdated": "2025-08-21T13:49:24.983Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-49222 (GCVE-0-2025-49222)
Vulnerability from cvelistv5 – Published: 2025-08-21 07:59 – Updated: 2025-08-21 13:57
VLAI?
EPSS
Title
Mattermost Shared Channel Upload Type Validation Bypass
Summary
Mattermost versions 10.8.x <= 10.8.3, 10.5.x <= 10.5.8, 9.11.x <= 9.11.17, 10.9.x <= 10.9.2, 10.10.x <= 10.10.0 fail to validate upload types in remote cluster upload sessions which allows a system admin to upload non-attachment file types via shared channels that could potentially be placed in arbitrary filesystem directories.
Severity ?
6.8 (Medium)
CWE
- CWE-434 - Unrestricted Upload of File with Dangerous Type
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Mattermost | Mattermost |
Affected:
10.8.0 , ≤ 10.8.3
(semver)
Affected: 10.5.0 , ≤ 10.5.8 (semver) Affected: 9.11.0 , ≤ 9.11.17 (semver) Affected: 10.9.0 , ≤ 10.9.2 (semver) Affected: 10.10.0 , ≤ 10.10.0 (semver) Unaffected: 10.11.0 Unaffected: 10.8.4 Unaffected: 10.5.9 Unaffected: 9.11.18 Unaffected: 10.9.3 Unaffected: 10.10.1 |
Credits
daw10
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-49222",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-21T13:57:06.140700Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-08-21T13:57:13.759Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Mattermost",
"vendor": "Mattermost",
"versions": [
{
"lessThanOrEqual": "10.8.3",
"status": "affected",
"version": "10.8.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "10.5.8",
"status": "affected",
"version": "10.5.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.11.17",
"status": "affected",
"version": "9.11.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "10.9.2",
"status": "affected",
"version": "10.9.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "10.10.0",
"status": "affected",
"version": "10.10.0",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "10.11.0"
},
{
"status": "unaffected",
"version": "10.8.4"
},
{
"status": "unaffected",
"version": "10.5.9"
},
{
"status": "unaffected",
"version": "9.11.18"
},
{
"status": "unaffected",
"version": "10.9.3"
},
{
"status": "unaffected",
"version": "10.10.1"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "daw10"
}
],
"descriptions": [
{
"lang": "en",
"value": "Mattermost versions 10.8.x \u003c= 10.8.3, 10.5.x \u003c= 10.5.8, 9.11.x \u003c= 9.11.17, 10.9.x \u003c= 10.9.2, 10.10.x \u003c= 10.10.0 fail to validate upload types in remote cluster upload sessions which allows a system admin to upload non-attachment file types via shared channels that could potentially be placed in arbitrary filesystem directories."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-434",
"description": "CWE-434: Unrestricted Upload of File with Dangerous Type",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-21T07:59:45.057Z",
"orgId": "9302f53e-dde5-4bf3-b2f2-a83f91ac0eee",
"shortName": "Mattermost"
},
"references": [
{
"url": "https://mattermost.com/security-updates"
}
],
"solutions": [
{
"lang": "en",
"value": "Update Mattermost to versions 10.11.0, 10.8.4, 10.5.9, 9.11.18, 10.9.3, 10.10.1 or higher."
}
],
"source": {
"advisory": "MMSA-2025-00505",
"defect": [
"https://mattermost.atlassian.net/browse/MM-64779"
],
"discovery": "EXTERNAL"
},
"title": "Mattermost Shared Channel Upload Type Validation Bypass"
}
},
"cveMetadata": {
"assignerOrgId": "9302f53e-dde5-4bf3-b2f2-a83f91ac0eee",
"assignerShortName": "Mattermost",
"cveId": "CVE-2025-49222",
"datePublished": "2025-08-21T07:59:45.057Z",
"dateReserved": "2025-07-22T07:46:53.179Z",
"dateUpdated": "2025-08-21T13:57:13.759Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-47870 (GCVE-0-2025-47870)
Vulnerability from cvelistv5 – Published: 2025-08-21 08:02 – Updated: 2025-08-21 13:53
VLAI?
EPSS
Title
Team invite ID leaked to team admin with no member invite privileges
Summary
Mattermost versions 10.8.x <= 10.8.3, 10.5.x <= 10.5.8, 9.11.x <= 9.11.17, 10.9.x <= 10.9.2 fail to sanitize the team invite ID in the POST /api/v4/teams/:teamId/restore endpoint which allows an team admin with no member invite privileges to get the team’s invite id.
Severity ?
4.3 (Medium)
CWE
- CWE-306 - Missing Authentication for Critical Function
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Mattermost | Mattermost |
Affected:
10.8.0 , ≤ 10.8.3
(semver)
Affected: 10.5.0 , ≤ 10.5.8 (semver) Affected: 9.11.0 , ≤ 9.11.17 (semver) Affected: 10.9.0 , ≤ 10.9.2 (semver) Unaffected: 10.10.0 Unaffected: 10.8.4 Unaffected: 10.5.9 Unaffected: 9.11.18 Unaffected: 10.9.3 |
Credits
omarAhmed1
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-47870",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-21T13:52:59.802915Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-08-21T13:53:10.862Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Mattermost",
"vendor": "Mattermost",
"versions": [
{
"lessThanOrEqual": "10.8.3",
"status": "affected",
"version": "10.8.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "10.5.8",
"status": "affected",
"version": "10.5.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.11.17",
"status": "affected",
"version": "9.11.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "10.9.2",
"status": "affected",
"version": "10.9.0",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "10.10.0"
},
{
"status": "unaffected",
"version": "10.8.4"
},
{
"status": "unaffected",
"version": "10.5.9"
},
{
"status": "unaffected",
"version": "9.11.18"
},
{
"status": "unaffected",
"version": "10.9.3"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "omarAhmed1"
}
],
"descriptions": [
{
"lang": "en",
"value": "Mattermost versions 10.8.x \u003c= 10.8.3, 10.5.x \u003c= 10.5.8, 9.11.x \u003c= 9.11.17, 10.9.x \u003c= 10.9.2 fail to sanitize the team invite ID in the POST /api/v4/teams/:teamId/restore endpoint which allows an team admin with no member invite privileges to get the team\u2019s invite id."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-306",
"description": "CWE-306: Missing Authentication for Critical Function",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-21T08:02:44.934Z",
"orgId": "9302f53e-dde5-4bf3-b2f2-a83f91ac0eee",
"shortName": "Mattermost"
},
"references": [
{
"url": "https://mattermost.com/security-updates"
}
],
"solutions": [
{
"lang": "en",
"value": "Update Mattermost to versions 10.10.0, 10.8.4, 10.5.9, 9.11.18, 10.9.3 or higher."
}
],
"source": {
"advisory": "MMSA-2025-00498",
"defect": [
"https://mattermost.atlassian.net/browse/MM-64571"
],
"discovery": "EXTERNAL"
},
"title": "Team invite ID leaked to team admin with no member invite privileges"
}
},
"cveMetadata": {
"assignerOrgId": "9302f53e-dde5-4bf3-b2f2-a83f91ac0eee",
"assignerShortName": "Mattermost",
"cveId": "CVE-2025-47870",
"datePublished": "2025-08-21T08:02:44.934Z",
"dateReserved": "2025-07-22T07:53:00.896Z",
"dateUpdated": "2025-08-21T13:53:10.862Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-6465 (GCVE-0-2025-6465)
Vulnerability from cvelistv5 – Published: 2025-08-21 17:01 – Updated: 2025-08-21 17:30
VLAI?
EPSS
Title
Path traversal in image upload with preview overwrite
Summary
Mattermost versions 10.8.x <= 10.8.3, 10.5.x <= 10.5.8, 10.10.x <= 10.10.0, 10.9.x <= 10.9.3 fail to sanitize file names which allows users with file upload permission to overwrite file attachment thumbnails via path traversal in file streaming APIs.
Severity ?
4.3 (Medium)
CWE
- CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Mattermost | Mattermost |
Affected:
10.8.0 , ≤ 10.8.3
(semver)
Affected: 10.5.0 , ≤ 10.5.8 (semver) Affected: 10.10.0 (semver) Affected: 10.9.0 , ≤ 10.9.3 (semver) Unaffected: 10.11.0 Unaffected: 10.8.4 Unaffected: 10.5.9 Unaffected: 10.10.1 Unaffected: 10.9.4 |
Credits
daw10
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-6465",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-21T17:21:02.910833Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-08-21T17:30:45.951Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Mattermost",
"vendor": "Mattermost",
"versions": [
{
"lessThanOrEqual": "10.8.3",
"status": "affected",
"version": "10.8.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "10.5.8",
"status": "affected",
"version": "10.5.0",
"versionType": "semver"
},
{
"status": "affected",
"version": "10.10.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "10.9.3",
"status": "affected",
"version": "10.9.0",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "10.11.0"
},
{
"status": "unaffected",
"version": "10.8.4"
},
{
"status": "unaffected",
"version": "10.5.9"
},
{
"status": "unaffected",
"version": "10.10.1"
},
{
"status": "unaffected",
"version": "10.9.4"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "daw10"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eMattermost versions 10.8.x \u0026lt;= 10.8.3, 10.5.x \u0026lt;= 10.5.8, 10.10.x \u0026lt;= 10.10.0, 10.9.x \u0026lt;= 10.9.3 fail to sanitize file names which allows users with file upload permission to overwrite file attachment thumbnails via path traversal in file streaming APIs.\u003c/p\u003e"
}
],
"value": "Mattermost versions 10.8.x \u003c= 10.8.3, 10.5.x \u003c= 10.5.8, 10.10.x \u003c= 10.10.0, 10.9.x \u003c= 10.9.3 fail to sanitize file names which allows users with file upload permission to overwrite file attachment thumbnails via path traversal in file streaming APIs."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-22",
"description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-21T17:01:42.866Z",
"orgId": "9302f53e-dde5-4bf3-b2f2-a83f91ac0eee",
"shortName": "Mattermost"
},
"references": [
{
"url": "https://mattermost.com/security-updates"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eUpdate Mattermost to versions 10.11.0, 10.8.4, 10.5.9, 10.10.1, 10.9.4 or higher.\u003c/p\u003e"
}
],
"value": "Update Mattermost to versions 10.11.0, 10.8.4, 10.5.9, 10.10.1, 10.9.4 or higher."
}
],
"source": {
"advisory": "MMSA-2025-00501",
"defect": [
"https://mattermost.atlassian.net/browse/MM-64657"
],
"discovery": "EXTERNAL"
},
"title": "Path traversal in image upload with preview overwrite",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "9302f53e-dde5-4bf3-b2f2-a83f91ac0eee",
"assignerShortName": "Mattermost",
"cveId": "CVE-2025-6465",
"datePublished": "2025-08-21T17:01:42.866Z",
"dateReserved": "2025-06-21T00:52:35.389Z",
"dateUpdated": "2025-08-21T17:30:45.951Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-36530 (GCVE-0-2025-36530)
Vulnerability from cvelistv5 – Published: 2025-08-21 07:11 – Updated: 2025-08-21 13:50
VLAI?
EPSS
Title
Import Path Traversal Enables Unauthorized Unsigned Plugin Installation
Summary
Mattermost versions 10.9.x <= 10.9.1, 10.8.x <= 10.8.3, 10.5.x <= 10.5.8, 9.11.x <= 9.11.17 fail to properly validate file paths during plugin import operations which allows restricted admin users to install unauthorized custom plugins via path traversal in the import functionality, bypassing plugin signature enforcement and marketplace restrictions.
Severity ?
6.8 (Medium)
CWE
- CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Mattermost | Mattermost |
Affected:
10.9.0 , ≤ 10.9.1
(semver)
Affected: 10.8.0 , ≤ 10.8.3 (semver) Affected: 10.5.0 , ≤ 10.5.8 (semver) Affected: 9.11.0 , ≤ 9.11.17 (semver) Unaffected: 10.10.0 Unaffected: 10.9.2 Unaffected: 10.8.4 Unaffected: 10.5.9 Unaffected: 9.11.18 |
Credits
Dawid Kulikowski (daw10)
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-36530",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-21T13:50:14.120426Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-08-21T13:50:42.949Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Mattermost",
"vendor": "Mattermost",
"versions": [
{
"lessThanOrEqual": "10.9.1",
"status": "affected",
"version": "10.9.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "10.8.3",
"status": "affected",
"version": "10.8.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "10.5.8",
"status": "affected",
"version": "10.5.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.11.17",
"status": "affected",
"version": "9.11.0",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "10.10.0"
},
{
"status": "unaffected",
"version": "10.9.2"
},
{
"status": "unaffected",
"version": "10.8.4"
},
{
"status": "unaffected",
"version": "10.5.9"
},
{
"status": "unaffected",
"version": "9.11.18"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Dawid Kulikowski (daw10)"
}
],
"descriptions": [
{
"lang": "en",
"value": "Mattermost versions 10.9.x \u003c= 10.9.1, 10.8.x \u003c= 10.8.3, 10.5.x \u003c= 10.5.8, 9.11.x \u003c= 9.11.17 fail to properly validate file paths during plugin import operations which allows restricted admin users to install unauthorized custom plugins via path traversal in the import functionality, bypassing plugin signature enforcement and marketplace restrictions."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-22",
"description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-21T07:11:43.241Z",
"orgId": "9302f53e-dde5-4bf3-b2f2-a83f91ac0eee",
"shortName": "Mattermost"
},
"references": [
{
"url": "https://mattermost.com/security-updates"
}
],
"solutions": [
{
"lang": "en",
"value": "Update Mattermost to versions 10.10.0, 10.9.2, 10.8.4, 10.5.9, 9.11.18 or higher."
}
],
"source": {
"advisory": "MMSA-2025-00500",
"defect": [
"https://mattermost.atlassian.net/browse/MM-64610"
],
"discovery": "EXTERNAL"
},
"title": "Import Path Traversal Enables Unauthorized Unsigned Plugin Installation"
}
},
"cveMetadata": {
"assignerOrgId": "9302f53e-dde5-4bf3-b2f2-a83f91ac0eee",
"assignerShortName": "Mattermost",
"cveId": "CVE-2025-36530",
"datePublished": "2025-08-21T07:11:43.241Z",
"dateReserved": "2025-07-22T07:46:53.193Z",
"dateUpdated": "2025-08-21T13:50:42.949Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-53971 (GCVE-0-2025-53971)
Vulnerability from cvelistv5 – Published: 2025-08-21 07:31 – Updated: 2025-08-21 14:51
VLAI?
EPSS
Title
Channel and Team Membership APIs inadvertently allow loss of Member privileges.
Summary
Mattermost versions 10.5.x <= 10.5.8, 9.11.x <= 9.11.17 fail to properly validate authorization for team scheme role modifications which allows Team Admins to demote Team Members to Guests via the PUT /api/v4/teams/team-id/members/user-id/schemeRoles API endpoint.
Severity ?
CWE
- CWE-863 - Incorrect Authorization
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Mattermost | Mattermost |
Affected:
10.5.0 , ≤ 10.5.8
(semver)
Affected: 9.11.0 , ≤ 9.11.17 (semver) Unaffected: 10.10.0 Unaffected: 10.5.9 Unaffected: 9.11.18 |
Credits
hackit_bharat
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-53971",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-21T14:51:10.911929Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-08-21T14:51:19.669Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Mattermost",
"vendor": "Mattermost",
"versions": [
{
"lessThanOrEqual": "10.5.8",
"status": "affected",
"version": "10.5.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.11.17",
"status": "affected",
"version": "9.11.0",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "10.10.0"
},
{
"status": "unaffected",
"version": "10.5.9"
},
{
"status": "unaffected",
"version": "9.11.18"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "hackit_bharat"
}
],
"descriptions": [
{
"lang": "en",
"value": "Mattermost versions 10.5.x \u003c= 10.5.8, 9.11.x \u003c= 9.11.17 fail to properly validate authorization for team scheme role modifications which allows Team Admins to demote Team Members to Guests via the PUT /api/v4/teams/team-id/members/user-id/schemeRoles API endpoint."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.8,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-863",
"description": "CWE-863: Incorrect Authorization",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-21T07:31:01.870Z",
"orgId": "9302f53e-dde5-4bf3-b2f2-a83f91ac0eee",
"shortName": "Mattermost"
},
"references": [
{
"url": "https://mattermost.com/security-updates"
}
],
"solutions": [
{
"lang": "en",
"value": "Update Mattermost to versions 10.10.0, 10.5.9, 9.11.18 or higher."
}
],
"source": {
"advisory": "MMSA-2025-00485",
"defect": [
"https://mattermost.atlassian.net/browse/MM-64177"
],
"discovery": "EXTERNAL"
},
"title": "Channel and Team Membership APIs inadvertently allow loss of Member privileges."
}
},
"cveMetadata": {
"assignerOrgId": "9302f53e-dde5-4bf3-b2f2-a83f91ac0eee",
"assignerShortName": "Mattermost",
"cveId": "CVE-2025-53971",
"datePublished": "2025-08-21T07:31:01.870Z",
"dateReserved": "2025-07-22T07:46:53.204Z",
"dateUpdated": "2025-08-21T14:51:19.669Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-8023 (GCVE-0-2025-8023)
Vulnerability from cvelistv5 – Published: 2025-08-21 07:51 – Updated: 2025-08-21 14:50
VLAI?
EPSS
Title
Path Traversal in Template Upload Allows Uploading Files Outside Target Directory
Summary
Mattermost versions 10.8.x <= 10.8.3, 10.5.x <= 10.5.8, 9.11.x <= 9.11.17, 10.9.x <= 10.9.2 fails to sanitize path traversal sequences in template file destination paths, which allows a system admin to perform path traversal attacks via malicious path components, potentially enabling malicious file placement outside intended directories.
Severity ?
6.8 (Medium)
CWE
- CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Mattermost | Mattermost |
Affected:
10.8.0 , ≤ 10.8.3
(semver)
Affected: 10.5.0 , ≤ 10.5.8 (semver) Affected: 9.11.0 , ≤ 9.11.17 (semver) Affected: 10.9.0 , ≤ 10.9.2 (semver) Unaffected: 10.10.0 Unaffected: 10.8.4 Unaffected: 10.5.9 Unaffected: 9.11.18 Unaffected: 10.9.3 |
Credits
Dawid Kulikowski (daw10)
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-8023",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-21T14:50:47.920308Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-08-21T14:50:55.341Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Mattermost",
"vendor": "Mattermost",
"versions": [
{
"lessThanOrEqual": "10.8.3",
"status": "affected",
"version": "10.8.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "10.5.8",
"status": "affected",
"version": "10.5.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.11.17",
"status": "affected",
"version": "9.11.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "10.9.2",
"status": "affected",
"version": "10.9.0",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "10.10.0"
},
{
"status": "unaffected",
"version": "10.8.4"
},
{
"status": "unaffected",
"version": "10.5.9"
},
{
"status": "unaffected",
"version": "9.11.18"
},
{
"status": "unaffected",
"version": "10.9.3"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Dawid Kulikowski (daw10)"
}
],
"descriptions": [
{
"lang": "en",
"value": "Mattermost versions 10.8.x \u003c= 10.8.3, 10.5.x \u003c= 10.5.8, 9.11.x \u003c= 9.11.17, 10.9.x \u003c= 10.9.2 fails to sanitize path traversal sequences in template file destination paths, which allows a system admin to perform path traversal attacks via malicious path components, potentially enabling malicious file placement outside intended directories."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-22",
"description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-21T07:51:37.130Z",
"orgId": "9302f53e-dde5-4bf3-b2f2-a83f91ac0eee",
"shortName": "Mattermost"
},
"references": [
{
"url": "https://mattermost.com/security-updates"
}
],
"solutions": [
{
"lang": "en",
"value": "Update Mattermost to versions 10.10.0, 10.8.4, 10.5.9, 9.11.18, 10.9.3 or higher."
}
],
"source": {
"advisory": "MMSA-2025-00499",
"defect": [
"https://mattermost.atlassian.net/browse/MM-64596"
],
"discovery": "EXTERNAL"
},
"title": "Path Traversal in Template Upload Allows Uploading Files Outside Target Directory"
}
},
"cveMetadata": {
"assignerOrgId": "9302f53e-dde5-4bf3-b2f2-a83f91ac0eee",
"assignerShortName": "Mattermost",
"cveId": "CVE-2025-8023",
"datePublished": "2025-08-21T07:51:37.130Z",
"dateReserved": "2025-07-22T08:03:06.489Z",
"dateUpdated": "2025-08-21T14:50:55.341Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…