Home

Description

Mattermost versions 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12, 11.0.x <= 11.0.3 fail to properly validate OAuth state tokens during OpenID Connect authentication which allows an authenticated attacker with team creation privileges to take over a user account via manipulation of authentication data during the OAuth completion flow. This requires email verification to be disabled (default: disabled), OAuth/OpenID Connect to be enabled, and the attacker to control two users in the SSO system with one of them never having logged into Mattermost.

PUBLISHED Reserved 2025-10-28 | Published 2025-11-27 | Updated 2025-12-02 | Assigner Mattermost




CRITICAL: 9.9CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Problem types

CWE-303: Incorrect Implementation of Authentication Algorithm

Product status

Default status
unaffected

10.12.0 (semver)
affected

10.11.0 (semver)
affected

10.5.0 (semver)
affected

11.0.0 (semver)
affected

11.1.0
unaffected

10.12.2
unaffected

10.11.5
unaffected

10.5.13
unaffected

11.0.4
unaffected

Credits

daw10 finder

References

mattermost.com/security-updates

cve.org (CVE-2025-12419)

nvd.nist.gov (CVE-2025-12419)

Download JSON