9.9
CVE-2025-4981
- EPSS 1.69%
- Veröffentlicht 20.06.2025 10:27:13
- Zuletzt bearbeitet 08.07.2025 17:59:42
- Quelle responsibledisclosure@mattermo
- CVE-Watchlists
- Unerledigt
Path Traversal Leading to RCE by Any Authenticated Mattermost User
Mattermost versions 10.5.x <= 10.5.5, 9.11.x <= 9.11.15, 10.8.x <= 10.8.0, 10.7.x <= 10.7.2, 10.6.x <= 10.6.5 fail to sanitize filenames in the archive extractor which allows authenticated users to write files to arbitrary locations on the filesystem via uploading archives with path traversal sequences in filenames, potentially leading to remote code execution. The vulnerability impacts instances where file uploads and document search by content is enabled (FileSettings.EnableFileAttachments = true and FileSettings.ExtractContent = true). These configuration settings are enabled by default.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Mattermost ≫ Mattermost Server Version >= 9.11.0 < 9.11.16
Mattermost ≫ Mattermost Server Version >= 10.5.0 < 10.5.6
Mattermost ≫ Mattermost Server Version >= 10.6.0 < 10.6.6
Mattermost ≫ Mattermost Server Version >= 10.7.0 < 10.7.3
Mattermost ≫ Mattermost Server Version10.8.0 Update-
Mattermost ≫ Mattermost Server Version10.8.0 Updaterc1
Mattermost ≫ Mattermost Server Version10.8.0 Updaterc2
Mattermost ≫ Mattermost Server Version10.8.0 Updaterc3
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 1.69% | 0.823 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| responsibledisclosure@mattermost.com | 9.9 | 3.1 | 6 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
|
CWE-427 Uncontrolled Search Path Element
The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.