Action not permitted
Modal body text goes here.
Modal Title
Modal Body
WID-SEC-W-2025-0410
Vulnerability from csaf_certbund - Published: 2025-02-18 23:00 - Updated: 2025-04-10 22:00Summary
Mattermost: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Mattermost ist ein webbasierter Instant-Messaging-Dienst.
Angriff
Ein Angreifer kann mehrere Schwachstellen in Mattermost ausnutzen, um Sicherheitsvorkehrungen zu umgehen, Informationen offenzulegen, bestimmte Befehle auszuführen und die Verfügbarkeit zu beeinflussen.
Betroffene Betriebssysteme
- Linux
- Sonstiges
- UNIX
- Windows
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Mattermost ist ein webbasierter Instant-Messaging-Dienst.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Mattermost ausnutzen, um Sicherheitsvorkehrungen zu umgehen, Informationen offenzulegen, bestimmte Befehle auszuf\u00fchren und die Verf\u00fcgbarkeit zu beeinflussen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-0410 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0410.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-0410 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0410"
},
{
"category": "external",
"summary": "Mattermost Security Updates vom 2025-02-18",
"url": "https://mattermost.com/security-updates/#server"
}
],
"source_lang": "en-US",
"title": "Mattermost: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-04-10T22:00:00.000+00:00",
"generator": {
"date": "2025-04-11T09:15:01.000+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.12"
}
},
"id": "WID-SEC-W-2025-0410",
"initial_release_date": "2025-02-18T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-02-18T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-03-23T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Informationen und CVE\u0027s erg\u00e4nzt"
},
{
"date": "2025-04-10T22:00:00.000+00:00",
"number": "3",
"summary": "CVE erg\u00e4nzt"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.6.0",
"product": {
"name": "Mattermost Mattermost \u003c10.6.0",
"product_id": "T041330"
}
},
{
"category": "product_version",
"name": "10.6.0",
"product": {
"name": "Mattermost Mattermost 10.6.0",
"product_id": "T041330-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:mattermost:mattermost_server:10.6.0"
}
}
},
{
"category": "product_version_range",
"name": "\u003c10.4.3",
"product": {
"name": "Mattermost Mattermost \u003c10.4.3",
"product_id": "T041331"
}
},
{
"category": "product_version",
"name": "10.4.3",
"product": {
"name": "Mattermost Mattermost 10.4.3",
"product_id": "T041331-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:mattermost:mattermost_server:10.4.3"
}
}
},
{
"category": "product_version_range",
"name": "\u003c10.3.4",
"product": {
"name": "Mattermost Mattermost \u003c10.3.4",
"product_id": "T041332"
}
},
{
"category": "product_version",
"name": "10.3.4",
"product": {
"name": "Mattermost Mattermost 10.3.4",
"product_id": "T041332-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:mattermost:mattermost_server:10.3.4"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.11.9",
"product": {
"name": "Mattermost Mattermost \u003c9.11.9",
"product_id": "T041333"
}
},
{
"category": "product_version",
"name": "9.11.9",
"product": {
"name": "Mattermost Mattermost 9.11.9",
"product_id": "T041333-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:mattermost:mattermost_server:9.11.9"
}
}
},
{
"category": "product_version_range",
"name": "\u003c10.5.1",
"product": {
"name": "Mattermost Mattermost \u003c10.5.1",
"product_id": "T041334"
}
},
{
"category": "product_version",
"name": "10.5.1",
"product": {
"name": "Mattermost Mattermost 10.5.1",
"product_id": "T041334-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:mattermost:mattermost_server:10.5.1"
}
}
}
],
"category": "product_name",
"name": "Mattermost"
}
],
"category": "vendor",
"name": "Mattermost"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-1472",
"product_status": {
"known_affected": [
"T041330",
"T041334",
"T041333",
"T041332",
"T041331"
]
},
"release_date": "2025-02-18T23:00:00.000+00:00",
"title": "CVE-2025-1472"
},
{
"cve": "CVE-2025-24866",
"product_status": {
"known_affected": [
"T041330",
"T041334",
"T041333",
"T041332",
"T041331"
]
},
"release_date": "2025-02-18T23:00:00.000+00:00",
"title": "CVE-2025-24866"
},
{
"cve": "CVE-2025-24920",
"product_status": {
"known_affected": [
"T041330",
"T041334",
"T041333",
"T041332",
"T041331"
]
},
"release_date": "2025-02-18T23:00:00.000+00:00",
"title": "CVE-2025-24920"
},
{
"cve": "CVE-2025-25068",
"product_status": {
"known_affected": [
"T041330",
"T041334",
"T041333",
"T041332",
"T041331"
]
},
"release_date": "2025-02-18T23:00:00.000+00:00",
"title": "CVE-2025-25068"
},
{
"cve": "CVE-2025-25274",
"product_status": {
"known_affected": [
"T041330",
"T041334",
"T041333",
"T041332",
"T041331"
]
},
"release_date": "2025-02-18T23:00:00.000+00:00",
"title": "CVE-2025-25274"
},
{
"cve": "CVE-2025-27715",
"product_status": {
"known_affected": [
"T041330",
"T041334",
"T041333",
"T041332",
"T041331"
]
},
"release_date": "2025-02-18T23:00:00.000+00:00",
"title": "CVE-2025-27715"
},
{
"cve": "CVE-2025-27933",
"product_status": {
"known_affected": [
"T041330",
"T041334",
"T041333",
"T041332",
"T041331"
]
},
"release_date": "2025-02-18T23:00:00.000+00:00",
"title": "CVE-2025-27933"
},
{
"cve": "CVE-2025-30179",
"product_status": {
"known_affected": [
"T041330",
"T041334",
"T041333",
"T041332",
"T041331"
]
},
"release_date": "2025-02-18T23:00:00.000+00:00",
"title": "CVE-2025-30179"
}
]
}
CVE-2025-25274 (GCVE-0-2025-25274)
Vulnerability from cvelistv5 – Published: 2025-03-21 08:24 – Updated: 2025-03-21 17:27
VLAI?
EPSS
Summary
Mattermost versions 10.4.x <= 10.4.2, 10.3.x <= 10.3.3, 9.11.x <= 9.11.8 fail to restrict command execution in archived channels, which allows authenticated users to run commands in archived channels.
Severity ?
4.3 (Medium)
CWE
- CWE-863 - Incorrect Authorization
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Mattermost | Mattermost |
Affected:
10.4.0 , ≤ 10.4.2
(semver)
Affected: 10.3.0 , ≤ 10.3.3 (semver) Affected: 9.11.0 , ≤ 9.11.8 (semver) Unaffected: 10.5.0 Unaffected: 10.4.3 Unaffected: 10.3.4 Unaffected: 9.11.9 |
Credits
hackit_bharat
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-25274",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-21T17:27:46.822244Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-03-21T17:27:56.172Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Mattermost",
"vendor": "Mattermost",
"versions": [
{
"lessThanOrEqual": "10.4.2",
"status": "affected",
"version": "10.4.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "10.3.3",
"status": "affected",
"version": "10.3.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.11.8",
"status": "affected",
"version": "9.11.0",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "10.5.0"
},
{
"status": "unaffected",
"version": "10.4.3"
},
{
"status": "unaffected",
"version": "10.3.4"
},
{
"status": "unaffected",
"version": "9.11.9"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "hackit_bharat"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eMattermost versions 10.4.x \u0026lt;= 10.4.2, 10.3.x \u0026lt;= 10.3.3, 9.11.x \u0026lt;= 9.11.8\u0026nbsp;\u003cspan style=\"background-color: var(--wht);\"\u003efail to restrict command execution in archived channels, which allows authenticated users to run commands in archived channels.\u003c/span\u003e\u003c/p\u003e"
}
],
"value": "Mattermost versions 10.4.x \u003c= 10.4.2, 10.3.x \u003c= 10.3.3, 9.11.x \u003c= 9.11.8\u00a0fail to restrict command execution in archived channels, which allows authenticated users to run commands in archived channels."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-863",
"description": "CWE-863: Incorrect Authorization",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-21T08:24:13.165Z",
"orgId": "9302f53e-dde5-4bf3-b2f2-a83f91ac0eee",
"shortName": "Mattermost"
},
"references": [
{
"url": "https://mattermost.com/security-updates"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eUpdate Mattermost to versions 10.5.0, 10.4.3, 10.3.4, 9.11.9 or higher.\u003c/p\u003e"
}
],
"value": "Update Mattermost to versions 10.5.0, 10.4.3, 10.3.4, 9.11.9 or higher."
}
],
"source": {
"advisory": "MMSA-2025-00421",
"defect": [
"https://mattermost.atlassian.net/browse/MM-62499"
],
"discovery": "EXTERNAL"
},
"title": "Unauthorized Command Execution in Archived Channels",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "9302f53e-dde5-4bf3-b2f2-a83f91ac0eee",
"assignerShortName": "Mattermost",
"cveId": "CVE-2025-25274",
"datePublished": "2025-03-21T08:24:13.165Z",
"dateReserved": "2025-03-20T08:20:28.196Z",
"dateUpdated": "2025-03-21T17:27:56.172Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-27715 (GCVE-0-2025-27715)
Vulnerability from cvelistv5 – Published: 2025-03-21 08:22 – Updated: 2025-03-21 13:35
VLAI?
EPSS
Summary
Mattermost versions 9.11.x <= 9.11.8 fail to prompt for explicit approval before adding a team admin to a private channel, which team admins to joining private channels via crafted permalink links without explicit consent from them.
Severity ?
CWE
- CWE-863 - Incorrect Authorization
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Mattermost | Mattermost |
Affected:
9.11.0 , ≤ 9.11.8
(semver)
Unaffected: 10.5.0 Unaffected: 9.11.9 |
Credits
Joram Wilander
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-27715",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-21T13:34:00.840353Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-03-21T13:35:01.832Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Mattermost",
"vendor": "Mattermost",
"versions": [
{
"lessThanOrEqual": "9.11.8",
"status": "affected",
"version": "9.11.0",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "10.5.0"
},
{
"status": "unaffected",
"version": "9.11.9"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Joram Wilander"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eMattermost versions 9.11.x \u0026lt;= 9.11.8 fail to prompt for explicit approval before adding a team admin to a private channel, which team admins to joining private channels via crafted permalink links without explicit consent from them.\u0026nbsp;\u003c/p\u003e"
}
],
"value": "Mattermost versions 9.11.x \u003c= 9.11.8 fail to prompt for explicit approval before adding a team admin to a private channel, which team admins to joining private channels via crafted permalink links without explicit consent from them."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-863",
"description": "CWE-863: Incorrect Authorization",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-21T08:22:25.321Z",
"orgId": "9302f53e-dde5-4bf3-b2f2-a83f91ac0eee",
"shortName": "Mattermost"
},
"references": [
{
"url": "https://mattermost.com/security-updates"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eUpdate Mattermost to versions 10.5.0, 9.11.9 or higher.\u003c/p\u003e"
}
],
"value": "Update Mattermost to versions 10.5.0, 9.11.9 or higher."
}
],
"source": {
"advisory": "MMSA-2024-00409",
"defect": [
"https://mattermost.atlassian.net/browse/MM-61846"
],
"discovery": "INTERNAL"
},
"title": "Auto-Enrollment of Team Admins into Private Channels without explicit consent",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "9302f53e-dde5-4bf3-b2f2-a83f91ac0eee",
"assignerShortName": "Mattermost",
"cveId": "CVE-2025-27715",
"datePublished": "2025-03-21T08:22:25.321Z",
"dateReserved": "2025-03-20T08:20:28.097Z",
"dateUpdated": "2025-03-21T13:35:01.832Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-1472 (GCVE-0-2025-1472)
Vulnerability from cvelistv5 – Published: 2025-03-19 14:11 – Updated: 2025-03-19 14:40
VLAI?
EPSS
Summary
Mattermost versions 9.11.x <= 9.11.8 fail to properly perform authorization of the Viewer role which allows an attacker with the Viewer role configured with No Access to Reporting to still view team and site statistics.
Severity ?
4.3 (Medium)
CWE
- CWE-863 - Incorrect Authorization
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Mattermost | Mattermost |
Affected:
9.11.0 , ≤ 9.11.8
(semver)
Unaffected: 10.5.0 Unaffected: 9.11.9 |
Credits
jeetbhdr
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-1472",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-19T14:39:55.742466Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-03-19T14:40:59.930Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Mattermost",
"vendor": "Mattermost",
"versions": [
{
"lessThanOrEqual": "9.11.8",
"status": "affected",
"version": "9.11.0",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "10.5.0"
},
{
"status": "unaffected",
"version": "9.11.9"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "jeetbhdr"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eMattermost versions 9.11.x \u0026lt;= 9.11.8 fail to properly perform authorization of the Viewer role which allows an attacker with the Viewer role configured with No Access to Reporting to still view team and site statistics.\u003c/p\u003e"
}
],
"value": "Mattermost versions 9.11.x \u003c= 9.11.8 fail to properly perform authorization of the Viewer role which allows an attacker with the Viewer role configured with No Access to Reporting to still view team and site statistics."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-863",
"description": "CWE-863: Incorrect Authorization",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-19T14:11:03.977Z",
"orgId": "9302f53e-dde5-4bf3-b2f2-a83f91ac0eee",
"shortName": "Mattermost"
},
"references": [
{
"url": "https://mattermost.com/security-updates"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eUpdate Mattermost to versions 10.5.0, 9.11.9 or higher.\u003c/p\u003e"
}
],
"value": "Update Mattermost to versions 10.5.0, 9.11.9 or higher."
}
],
"source": {
"advisory": "MMSA-2024-00411",
"defect": [
"https://mattermost.atlassian.net/browse/MM-62053"
],
"discovery": "EXTERNAL"
},
"title": "Unauthorized View Access to Site Statistics and Team Statistics",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "9302f53e-dde5-4bf3-b2f2-a83f91ac0eee",
"assignerShortName": "Mattermost",
"cveId": "CVE-2025-1472",
"datePublished": "2025-03-19T14:11:03.977Z",
"dateReserved": "2025-02-19T15:34:14.680Z",
"dateUpdated": "2025-03-19T14:40:59.930Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-25068 (GCVE-0-2025-25068)
Vulnerability from cvelistv5 – Published: 2025-03-21 08:26 – Updated: 2025-03-21 12:25
VLAI?
EPSS
Summary
Mattermost versions 10.4.x <= 10.4.2, 10.3.x <= 10.3.3, 9.11.x <= 9.11.8, 10.5.x <= 10.5.0 fail to enforce MFA on plugin endpoints, which allows authenticated attackers to bypass MFA protections via API requests to plugin-specific routes.
Severity ?
7.5 (High)
CWE
- CWE-306 - Missing Authentication for Critical Function
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Mattermost | Mattermost |
Affected:
10.4.0 , ≤ 10.4.2
(semver)
Affected: 10.3.0 , ≤ 10.3.3 (semver) Affected: 9.11.0 , ≤ 9.11.8 (semver) Affected: 10.5.0 Unaffected: 10.6.0 Unaffected: 10.4.3 Unaffected: 10.3.4 Unaffected: 9.11.9 Unaffected: 10.5.1 |
Credits
0x7oda7123
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-25068",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-21T12:25:01.341026Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-03-21T12:25:55.494Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Mattermost",
"vendor": "Mattermost",
"versions": [
{
"lessThanOrEqual": "10.4.2",
"status": "affected",
"version": "10.4.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "10.3.3",
"status": "affected",
"version": "10.3.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.11.8",
"status": "affected",
"version": "9.11.0",
"versionType": "semver"
},
{
"status": "affected",
"version": "10.5.0"
},
{
"status": "unaffected",
"version": "10.6.0"
},
{
"status": "unaffected",
"version": "10.4.3"
},
{
"status": "unaffected",
"version": "10.3.4"
},
{
"status": "unaffected",
"version": "9.11.9"
},
{
"status": "unaffected",
"version": "10.5.1"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "0x7oda7123"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eMattermost versions 10.4.x \u0026lt;= 10.4.2, 10.3.x \u0026lt;= 10.3.3, 9.11.x \u0026lt;= 9.11.8, 10.5.x \u0026lt;= 10.5.0 fail to enforce MFA on plugin endpoints, which allows authenticated attackers to bypass MFA protections via API requests to plugin-specific routes.\u003c/p\u003e"
}
],
"value": "Mattermost versions 10.4.x \u003c= 10.4.2, 10.3.x \u003c= 10.3.3, 9.11.x \u003c= 9.11.8, 10.5.x \u003c= 10.5.0 fail to enforce MFA on plugin endpoints, which allows authenticated attackers to bypass MFA protections via API requests to plugin-specific routes."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-306",
"description": "CWE-306: Missing Authentication for Critical Function",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-21T08:26:32.027Z",
"orgId": "9302f53e-dde5-4bf3-b2f2-a83f91ac0eee",
"shortName": "Mattermost"
},
"references": [
{
"url": "https://mattermost.com/security-updates"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eUpdate Mattermost to versions 10.6.0, 10.4.3, 10.3.4, 9.11.9, 10.5.1 or higher.\u003c/p\u003e"
}
],
"value": "Update Mattermost to versions 10.6.0, 10.4.3, 10.3.4, 9.11.9, 10.5.1 or higher."
}
],
"source": {
"advisory": "MMSA-2025-00444",
"defect": [
"https://mattermost.atlassian.net/browse/MM-62913"
],
"discovery": "EXTERNAL"
},
"title": "Bypassing MFA Enforcement on Plugin Endpoints",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "9302f53e-dde5-4bf3-b2f2-a83f91ac0eee",
"assignerShortName": "Mattermost",
"cveId": "CVE-2025-25068",
"datePublished": "2025-03-21T08:26:32.027Z",
"dateReserved": "2025-03-20T08:20:28.141Z",
"dateUpdated": "2025-03-21T12:25:55.494Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-27933 (GCVE-0-2025-27933)
Vulnerability from cvelistv5 – Published: 2025-03-21 08:23 – Updated: 2025-03-21 13:32
VLAI?
EPSS
Summary
Mattermost versions 10.4.x <= 10.4.2, 10.3.x <= 10.3.3, 9.11.x <= 9.11.8 fail to fail to enforce channel conversion restrictions, which allows members with permission to convert public channels to private ones to also convert private ones to public
Severity ?
5.4 (Medium)
CWE
- CWE-863 - Incorrect Authorization
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Mattermost | Mattermost |
Affected:
10.4.0 , ≤ 10.4.2
(semver)
Affected: 10.3.0 , ≤ 10.3.3 (semver) Affected: 9.11.0 , ≤ 9.11.8 (semver) Unaffected: 10.5.0 Unaffected: 10.4.3 Unaffected: 10.3.4 Unaffected: 9.11.9 |
Credits
mrhashimamin
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-27933",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-21T13:32:36.989272Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-03-21T13:32:57.219Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Mattermost",
"vendor": "Mattermost",
"versions": [
{
"lessThanOrEqual": "10.4.2",
"status": "affected",
"version": "10.4.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "10.3.3",
"status": "affected",
"version": "10.3.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.11.8",
"status": "affected",
"version": "9.11.0",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "10.5.0"
},
{
"status": "unaffected",
"version": "10.4.3"
},
{
"status": "unaffected",
"version": "10.3.4"
},
{
"status": "unaffected",
"version": "9.11.9"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "mrhashimamin"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eMattermost versions 10.4.x \u0026lt;= 10.4.2, 10.3.x \u0026lt;= 10.3.3, 9.11.x \u0026lt;= 9.11.8 fail to fail to enforce channel conversion restrictions, which allows members with permission to convert public channels to private ones to also convert private ones to public\u003c/p\u003e"
}
],
"value": "Mattermost versions 10.4.x \u003c= 10.4.2, 10.3.x \u003c= 10.3.3, 9.11.x \u003c= 9.11.8 fail to fail to enforce channel conversion restrictions, which allows members with permission to convert public channels to private ones to also convert private ones to public"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-863",
"description": "CWE-863: Incorrect Authorization",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-21T08:23:20.955Z",
"orgId": "9302f53e-dde5-4bf3-b2f2-a83f91ac0eee",
"shortName": "Mattermost"
},
"references": [
{
"url": "https://mattermost.com/security-updates"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eUpdate Mattermost to versions 10.5.0, 10.4.3, 10.3.4, 9.11.9 or higher.\u003c/p\u003e"
}
],
"value": "Update Mattermost to versions 10.5.0, 10.4.3, 10.3.4, 9.11.9 or higher."
}
],
"source": {
"advisory": "MMSA-2025-00418",
"defect": [
"https://mattermost.atlassian.net/browse/MM-62401"
],
"discovery": "EXTERNAL"
},
"title": "Unauthorized Private-to-Public Channel Conversion",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "9302f53e-dde5-4bf3-b2f2-a83f91ac0eee",
"assignerShortName": "Mattermost",
"cveId": "CVE-2025-27933",
"datePublished": "2025-03-21T08:23:20.955Z",
"dateReserved": "2025-03-20T08:20:28.128Z",
"dateUpdated": "2025-03-21T13:32:57.219Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-24866 (GCVE-0-2025-24866)
Vulnerability from cvelistv5 – Published: 2025-04-10 15:33 – Updated: 2025-04-10 15:43
VLAI?
EPSS
Summary
Mattermost versions 9.11.x <= 9.11.8 fail to enforce proper access controls on the /api/v4/audits endpoint, allowing users with delegated granular administration roles who lack access to Compliance Monitoring to retrieve User Activity Logs.
Severity ?
CWE
- CWE-863 - Incorrect Authorization
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Mattermost | Mattermost |
Affected:
9.11.0 , ≤ 9.11.8
(semver)
Unaffected: 10.5.0 Unaffected: 9.11.9 |
Credits
BasilJawan
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-24866",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-10T15:43:44.796100Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-04-10T15:43:54.351Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Mattermost",
"vendor": "Mattermost",
"versions": [
{
"lessThanOrEqual": "9.11.8",
"status": "affected",
"version": "9.11.0",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "10.5.0"
},
{
"status": "unaffected",
"version": "9.11.9"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "BasilJawan"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eMattermost versions 9.11.x \u0026lt;= 9.11.8\u0026nbsp; fail to enforce proper access controls on the /api/v4/audits endpoint, allowing users with delegated granular administration roles who lack access to Compliance Monitoring to retrieve User Activity Logs.\u003c/p\u003e"
}
],
"value": "Mattermost versions 9.11.x \u003c= 9.11.8\u00a0 fail to enforce proper access controls on the /api/v4/audits endpoint, allowing users with delegated granular administration roles who lack access to Compliance Monitoring to retrieve User Activity Logs."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 2.7,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-863",
"description": "CWE-863: Incorrect Authorization",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-04-10T15:33:21.882Z",
"orgId": "9302f53e-dde5-4bf3-b2f2-a83f91ac0eee",
"shortName": "Mattermost"
},
"references": [
{
"url": "https://mattermost.com/security-updates"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eUpdate Mattermost to versions 10.5.0, 9.11.9 or higher.\u003c/p\u003e"
}
],
"value": "Update Mattermost to versions 10.5.0, 9.11.9 or higher."
}
],
"source": {
"advisory": "MMSA-2024-00416",
"defect": [
"https://mattermost.atlassian.net/browse/MM-62020"
],
"discovery": "EXTERNAL"
},
"title": "Unauthorized Access to User Activity Logs API by delegated granular administration roles",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "9302f53e-dde5-4bf3-b2f2-a83f91ac0eee",
"assignerShortName": "Mattermost",
"cveId": "CVE-2025-24866",
"datePublished": "2025-04-10T15:33:21.882Z",
"dateReserved": "2025-03-20T08:20:28.204Z",
"dateUpdated": "2025-04-10T15:43:54.351Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-30179 (GCVE-0-2025-30179)
Vulnerability from cvelistv5 – Published: 2025-03-21 08:24 – Updated: 2025-03-21 17:27
VLAI?
EPSS
Summary
Mattermost versions 10.4.x <= 10.4.2, 10.3.x <= 10.3.3, 9.11.x <= 9.11.8 fail to enforce MFA on certain search APIs, which allows authenticated attackers to bypass MFA protections via user search, channel search, or team search queries.
Severity ?
4.3 (Medium)
CWE
- CWE-863 - Incorrect Authorization
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Mattermost | Mattermost |
Affected:
10.4.0 , ≤ 10.4.2
(semver)
Affected: 10.3.0 , ≤ 10.3.3 (semver) Affected: 9.11.0 , ≤ 9.11.8 (semver) Unaffected: 10.5.0 Unaffected: 10.4.3 Unaffected: 10.3.4 Unaffected: 9.11.9 |
Credits
A_osman123
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-30179",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-21T17:27:22.831583Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-03-21T17:27:31.203Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Mattermost",
"vendor": "Mattermost",
"versions": [
{
"lessThanOrEqual": "10.4.2",
"status": "affected",
"version": "10.4.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "10.3.3",
"status": "affected",
"version": "10.3.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.11.8",
"status": "affected",
"version": "9.11.0",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "10.5.0"
},
{
"status": "unaffected",
"version": "10.4.3"
},
{
"status": "unaffected",
"version": "10.3.4"
},
{
"status": "unaffected",
"version": "9.11.9"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "A_osman123"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eMattermost versions 10.4.x \u0026lt;= 10.4.2, 10.3.x \u0026lt;= 10.3.3, 9.11.x \u0026lt;= 9.11.8 fail to enforce MFA on certain search APIs, which allows authenticated attackers to bypass MFA protections via user search, channel search, or team search queries.\u003c/p\u003e"
}
],
"value": "Mattermost versions 10.4.x \u003c= 10.4.2, 10.3.x \u003c= 10.3.3, 9.11.x \u003c= 9.11.8 fail to enforce MFA on certain search APIs, which allows authenticated attackers to bypass MFA protections via user search, channel search, or team search queries."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-863",
"description": "CWE-863: Incorrect Authorization",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-21T08:24:57.929Z",
"orgId": "9302f53e-dde5-4bf3-b2f2-a83f91ac0eee",
"shortName": "Mattermost"
},
"references": [
{
"url": "https://mattermost.com/security-updates"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eUpdate Mattermost to versions 10.5.0, 10.4.3, 10.3.4, 9.11.9 or higher.\u003c/p\u003e"
}
],
"value": "Update Mattermost to versions 10.5.0, 10.4.3, 10.3.4, 9.11.9 or higher."
}
],
"source": {
"advisory": "MMSA-2025-00422",
"defect": [
"https://mattermost.atlassian.net/browse/MM-62501"
],
"discovery": "EXTERNAL"
},
"title": "MFA Enforcement Bypass in Search APIs",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "9302f53e-dde5-4bf3-b2f2-a83f91ac0eee",
"assignerShortName": "Mattermost",
"cveId": "CVE-2025-30179",
"datePublished": "2025-03-21T08:24:57.929Z",
"dateReserved": "2025-03-20T08:20:28.171Z",
"dateUpdated": "2025-03-21T17:27:31.203Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-24920 (GCVE-0-2025-24920)
Vulnerability from cvelistv5 – Published: 2025-03-21 08:25 – Updated: 2025-03-21 12:28
VLAI?
EPSS
Summary
Mattermost versions 10.4.x <= 10.4.2, 10.3.x <= 10.3.3, 9.11.x <= 9.11.8, 10.5.x <= 10.5.0 fail to restrict bookmark creation and updates in archived channels, which allows authenticated users created or update bookmarked in archived channels
Severity ?
4.3 (Medium)
CWE
- CWE-863 - Incorrect Authorization
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Mattermost | Mattermost |
Affected:
10.4.0 , ≤ 10.4.2
(semver)
Affected: 10.3.0 , ≤ 10.3.3 (semver) Affected: 9.11.0 , ≤ 9.11.8 (semver) Affected: 10.5.0 Unaffected: 10.6.0 Unaffected: 10.4.3 Unaffected: 10.3.4 Unaffected: 9.11.9 Unaffected: 10.5.1 |
Credits
Caleb Roseland
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-24920",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-21T12:26:24.639447Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-03-21T12:28:00.367Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Mattermost",
"vendor": "Mattermost",
"versions": [
{
"lessThanOrEqual": "10.4.2",
"status": "affected",
"version": "10.4.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "10.3.3",
"status": "affected",
"version": "10.3.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.11.8",
"status": "affected",
"version": "9.11.0",
"versionType": "semver"
},
{
"status": "affected",
"version": "10.5.0"
},
{
"status": "unaffected",
"version": "10.6.0"
},
{
"status": "unaffected",
"version": "10.4.3"
},
{
"status": "unaffected",
"version": "10.3.4"
},
{
"status": "unaffected",
"version": "9.11.9"
},
{
"status": "unaffected",
"version": "10.5.1"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Caleb Roseland"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eMattermost versions 10.4.x \u0026lt;= 10.4.2, 10.3.x \u0026lt;= 10.3.3, 9.11.x \u0026lt;= 9.11.8, 10.5.x \u0026lt;= 10.5.0\u0026nbsp;fail to restrict bookmark creation and updates in archived channels, which allows authenticated users created or update bookmarked in archived channels\u003c/p\u003e"
}
],
"value": "Mattermost versions 10.4.x \u003c= 10.4.2, 10.3.x \u003c= 10.3.3, 9.11.x \u003c= 9.11.8, 10.5.x \u003c= 10.5.0\u00a0fail to restrict bookmark creation and updates in archived channels, which allows authenticated users created or update bookmarked in archived channels"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-863",
"description": "CWE-863: Incorrect Authorization",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-21T08:25:44.676Z",
"orgId": "9302f53e-dde5-4bf3-b2f2-a83f91ac0eee",
"shortName": "Mattermost"
},
"references": [
{
"url": "https://mattermost.com/security-updates"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eUpdate Mattermost to versions 10.6.0, 10.4.3, 10.3.4, 9.11.9, 10.5.1 or higher.\u003c/p\u003e"
}
],
"value": "Update Mattermost to versions 10.6.0, 10.4.3, 10.3.4, 9.11.9, 10.5.1 or higher."
}
],
"source": {
"advisory": "MMSA-2025-00432",
"defect": [
"https://mattermost.atlassian.net/browse/MM-62688"
],
"discovery": "EXTERNAL"
},
"title": "Unauthorized Bookmark Creation and Modification in Archived Channels",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "9302f53e-dde5-4bf3-b2f2-a83f91ac0eee",
"assignerShortName": "Mattermost",
"cveId": "CVE-2025-24920",
"datePublished": "2025-03-21T08:25:44.676Z",
"dateReserved": "2025-03-20T08:20:28.187Z",
"dateUpdated": "2025-03-21T12:28:00.367Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…