9.9
CVE-2025-4981
- EPSS 0.31%
- Veröffentlicht 20.06.2025 10:27:13
- Zuletzt bearbeitet 08.07.2025 17:59:42
- Quelle responsibledisclosure@mattermo
- Teams Watchlist Login
- Unerledigt Login
Mattermost versions 10.5.x <= 10.5.5, 9.11.x <= 9.11.15, 10.8.x <= 10.8.0, 10.7.x <= 10.7.2, 10.6.x <= 10.6.5 fail to sanitize filenames in the archive extractor which allows authenticated users to write files to arbitrary locations on the filesystem via uploading archives with path traversal sequences in filenames, potentially leading to remote code execution. The vulnerability impacts instances where file uploads and document search by content is enabled (FileSettings.EnableFileAttachments = true and FileSettings.ExtractContent = true). These configuration settings are enabled by default.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Mattermost ≫ Mattermost Server Version >= 9.11.0 < 9.11.16
Mattermost ≫ Mattermost Server Version >= 10.5.0 < 10.5.6
Mattermost ≫ Mattermost Server Version >= 10.6.0 < 10.6.6
Mattermost ≫ Mattermost Server Version >= 10.7.0 < 10.7.3
Mattermost ≫ Mattermost Server Version10.8.0 Update-
Mattermost ≫ Mattermost Server Version10.8.0 Updaterc1
Mattermost ≫ Mattermost Server Version10.8.0 Updaterc2
Mattermost ≫ Mattermost Server Version10.8.0 Updaterc3
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.31% | 0.533 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
responsibledisclosure@mattermost.com | 9.9 | 3.1 | 6 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
|
CWE-427 Uncontrolled Search Path Element
The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.