9.9

CVE-2025-4981

Path Traversal Leading to RCE by Any Authenticated Mattermost User

Mattermost versions 10.5.x <= 10.5.5, 9.11.x <= 9.11.15, 10.8.x <= 10.8.0, 10.7.x <= 10.7.2, 10.6.x <= 10.6.5 fail to sanitize filenames in the archive extractor which allows authenticated users to write files to arbitrary locations on the filesystem via uploading archives with path traversal sequences in filenames, potentially leading to remote code execution. The vulnerability impacts instances where file uploads and document search by content is enabled (FileSettings.EnableFileAttachments = true and FileSettings.ExtractContent = true). These configuration settings are enabled by default.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
MattermostMattermost Server Version >= 9.11.0 < 9.11.16
MattermostMattermost Server Version >= 10.5.0 < 10.5.6
MattermostMattermost Server Version >= 10.6.0 < 10.6.6
MattermostMattermost Server Version >= 10.7.0 < 10.7.3
MattermostMattermost Server Version10.8.0 Update-
MattermostMattermost Server Version10.8.0 Updaterc1
MattermostMattermost Server Version10.8.0 Updaterc2
MattermostMattermost Server Version10.8.0 Updaterc3
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 1.69% 0.823
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
responsibledisclosure@mattermost.com 9.9 3.1 6
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
CWE-427 Uncontrolled Search Path Element

The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.