Home

Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).

PUBLISHED Reserved 2025-10-28 | Published 2025-11-27 | Updated 2025-12-02 | Assigner Mattermost




CRITICAL: 9.9CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Problem types

CWE-303: Incorrect Implementation of Authentication Algorithm

Product status

Default status
unaffected

11.0.0 (semver)
affected

10.12.0 (semver)
affected

10.11.0 (semver)
affected

10.5.0 (semver)
affected

11.1.0
unaffected

11.0.3
unaffected

10.12.2
unaffected

10.11.5
unaffected

10.5.13
unaffected

Credits

daw10 finder

References

mattermost.com/security-updates

cve.org (CVE-2025-12421)

nvd.nist.gov (CVE-2025-12421)

Download JSON