9.9

CVE-2025-4981

Mattermost versions 10.5.x <= 10.5.5, 9.11.x <= 9.11.15, 10.8.x <= 10.8.0, 10.7.x <= 10.7.2, 10.6.x <= 10.6.5 fail to sanitize filenames in the archive extractor which allows authenticated users to write files to arbitrary locations on the filesystem via uploading archives with path traversal sequences in filenames, potentially leading to remote code execution. The vulnerability impacts instances where file uploads and document search by content is enabled (FileSettings.EnableFileAttachments = true and FileSettings.ExtractContent = true). These configuration settings are enabled by default.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Data is provided by the National Vulnerability Database (NVD)
MattermostMattermost Server Version >= 9.11.0 < 9.11.16
MattermostMattermost Server Version >= 10.5.0 < 10.5.6
MattermostMattermost Server Version >= 10.6.0 < 10.6.6
MattermostMattermost Server Version >= 10.7.0 < 10.7.3
MattermostMattermost Server Version10.8.0 Update-
MattermostMattermost Server Version10.8.0 Updaterc1
MattermostMattermost Server Version10.8.0 Updaterc2
MattermostMattermost Server Version10.8.0 Updaterc3
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.31% 0.533
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
responsibledisclosure@mattermost.com 9.9 3.1 6
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
CWE-427 Uncontrolled Search Path Element

The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.