We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-3230

Bypass of System Admin User Deactivation Controls for Personal Access Tokens in Mattermost Server



Description

Mattermost versions 10.7.x <= 10.7.0, 10.6.x <= 10.6.2, 10.5.x <= 10.5.3, 9.11.x <= 9.11.12 fails to properly invalidate personal access tokens upon user deactivation, allowing deactivated users to maintain full system access by exploiting access token validation flaws via continued usage of previously issued tokens.

Reserved 2025-04-03 | Published 2025-05-30 | Updated 2025-05-30 | Assigner Mattermost


MEDIUM: 5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

Problem types

CWE-303: Incorrect Implementation of Authentication Algorithm

Product status

Default status
unaffected

10.7.0
affected

10.6.0
affected

10.5.0
affected

9.11.0
affected

10.8.0
unaffected

10.7.1
unaffected

10.6.3
unaffected

10.5.4
unaffected

9.11.13
unaffected

Credits

eAhmed finder

References

mattermost.com/security-updates

cve.org (CVE-2025-3230)

nvd.nist.gov (CVE-2025-3230)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-3230

Support options

Helpdesk Chat, Email, Knowledgebase