Filtered by vendor Mattermost
Subscriptions
Filtered by product Mattermost
Subscriptions
Total
158 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2025-47700 | 1 Mattermost | 2 Mattermost, Server | 2025-08-21 | 3.5 Low |
Mattermost Server versions 10.5.x <= 10.5.9 utilizing the Agents plugin fail to reject empty request bodies which allows users to trick users into clicking malicious links via post actions | ||||
CVE-2025-53971 | 1 Mattermost | 1 Mattermost | 2025-08-21 | 3.8 Low |
Mattermost versions 10.5.x <= 10.5.8, 9.11.x <= 9.11.17 fail to properly validate authorization for team scheme role modifications which allows Team Admins to demote Team Members to Guests via the PUT /api/v4/teams/team-id/members/user-id/schemeRoles API endpoint. | ||||
CVE-2025-8023 | 1 Mattermost | 1 Mattermost | 2025-08-21 | 6.8 Medium |
Mattermost versions 10.8.x <= 10.8.3, 10.5.x <= 10.5.8, 9.11.x <= 9.11.17, 10.9.x <= 10.9.2 fails to sanitize path traversal sequences in template file destination paths, which allows a system admin to perform path traversal attacks via malicious path components, potentially enabling malicious file placement outside intended directories. | ||||
CVE-2025-49222 | 1 Mattermost | 1 Mattermost | 2025-08-21 | 6.8 Medium |
Mattermost versions 10.8.x <= 10.8.3, 10.5.x <= 10.5.8, 9.11.x <= 9.11.17, 10.9.x <= 10.9.2, 10.10.x <= 10.10.0 fail to validate upload types in remote cluster upload sessions which allows a system admin to upload non-attachment file types via shared channels that could potentially be placed in arbitrary filesystem directories. | ||||
CVE-2025-47870 | 1 Mattermost | 1 Mattermost | 2025-08-21 | 4.3 Medium |
Mattermost versions 10.8.x <= 10.8.3, 10.5.x <= 10.5.8, 9.11.x <= 9.11.17, 10.9.x <= 10.9.2 fail to sanitize the team invite ID in the POST /api/v4/teams/:teamId/restore endpoint which allows an team admin with no member invite privileges to get the team’s invite id. | ||||
CVE-2025-36530 | 1 Mattermost | 1 Mattermost | 2025-08-21 | 6.8 Medium |
Mattermost versions 10.9.x <= 10.9.1, 10.8.x <= 10.8.3, 10.5.x <= 10.5.8, 9.11.x <= 9.11.17 fail to properly validate file paths during plugin import operations which allows restricted admin users to install unauthorized custom plugins via path traversal in the import functionality, bypassing plugin signature enforcement and marketplace restrictions. | ||||
CVE-2025-49810 | 1 Mattermost | 1 Mattermost | 2025-08-21 | 3.5 Low |
Mattermost versions 10.5.x <= 10.5.8 fail to validate access controls at time of access which allows user to read a thread via AI posts | ||||
CVE-2025-20051 | 1 Mattermost | 2 Mattermost, Mattermost Server | 2025-08-18 | 9.9 Critical |
Mattermost versions 10.4.x <= 10.4.1, 9.11.x <= 9.11.7, 10.3.x <= 10.3.2, 10.2.x <= 10.2.2 fail to properly validate input when patching and duplicating a board, which allows a user to read any arbitrary file on the system via duplicating a specially crafted block in Boards. | ||||
CVE-2025-44001 | 1 Mattermost | 1 Mattermost | 2025-08-12 | 4 Medium |
Mattermost Confluence Plugin version <1.5.0 fails to check the access of the user to the channel which allows attackers to get channel subscription details without proper access to the channel via API call to the Get Channel Subscriptions details endpoint. | ||||
CVE-2025-54478 | 1 Mattermost | 1 Mattermost | 2025-08-12 | 7.2 High |
Mattermost Confluence Plugin version <1.5.0 fails to enforce authentication of the user to the Mattermost instance which allows unauthenticated attackers to edit channel subscriptions via API call to the edit channel subscription endpoint. | ||||
CVE-2025-53514 | 1 Mattermost | 1 Mattermost | 2025-08-12 | 5.9 Medium |
Mattermost Confluence Plugin version <1.5.0 fails to handle unexpected request body which allows attackers to crash the plugin via constant hit to server webhook endpoint with an invalid request body. | ||||
CVE-2025-44004 | 1 Mattermost | 1 Mattermost | 2025-08-12 | 7.2 High |
Mattermost Confluence Plugin version <1.5.0 fails to check the authorization of the user to the Mattermost instance which allows attackers to create a channel subscription without proper authorization via API call to the create channel subscription endpoint. | ||||
CVE-2025-54458 | 1 Mattermost | 1 Mattermost | 2025-08-12 | 5 Medium |
Mattermost Confluence Plugin version <1.5.0 fails to check the access of the user to the Confluence space which allows attackers to create a subscription for a Confluence space the user does not have access to via the create subscription endpoint. | ||||
CVE-2025-8285 | 1 Mattermost | 1 Mattermost | 2025-08-12 | 4 Medium |
Mattermost Confluence Plugin version <1.5.0 fails to check the access of the user to the channel which allows attackers to create channel subscription without proper access to the channel via API call to the create channel subscription endpoint. | ||||
CVE-2025-48731 | 1 Mattermost | 1 Mattermost | 2025-08-12 | 6.4 Medium |
Mattermost Confluence Plugin version <1.5.0 fails to check the access of the user to the Confluence space which allows attackers to edit a subscription for a Confluence space the user does not have access for via edit subscription endpoint. | ||||
CVE-2025-53910 | 1 Mattermost | 1 Mattermost | 2025-08-12 | 4 Medium |
Mattermost Confluence Plugin version <1.5.0 fails to check the access of the user to the channel which allows attackers to create a channel subscription without proper access to the channel via API call to the edit channel subscription endpoint. | ||||
CVE-2025-53857 | 1 Mattermost | 1 Mattermost | 2025-08-12 | 3.7 Low |
Mattermost Confluence Plugin version <1.5.0 fails to check the access of the user to the channel which allows attackers to get channel subscription details without proper access to the channel via API call to the GET autocomplete/GetChannelSubscriptions endpoint. | ||||
CVE-2025-49221 | 1 Mattermost | 1 Mattermost | 2025-08-12 | 3.7 Low |
Mattermost Confluence Plugin version <1.5.0 fails to enforce authentication of the user to the Mattermost instance which allows unauthenticated attackers to access subscription details without via API call to GET subscription endpoint. | ||||
CVE-2025-54463 | 1 Mattermost | 1 Mattermost | 2025-08-12 | 5.9 Medium |
Mattermost Confluence Plugin version <1.5.0 fails to handle unexpected request body which allows attackers to crash the plugin via constant hit to server webhook endpoint with an invalid request body. | ||||
CVE-2025-52931 | 1 Mattermost | 1 Mattermost | 2025-08-12 | 7.5 High |
Mattermost Confluence Plugin version <1.5.0 fails to handle unexpected request body which allows attackers to crash the plugin via constant hit to update channel subscription endpoint with an invalid request body. |