We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-4981

Path Traversal Leading to RCE by Any Authenticated Mattermost User



Description

Mattermost versions 10.5.x <= 10.5.5, 9.11.x <= 9.11.15, 10.8.x <= 10.8.0, 10.7.x <= 10.7.2, 10.6.x <= 10.6.5 fail to sanitize filenames in the archive extractor which allows authenticated users to write files to arbitrary locations on the filesystem via uploading archives with path traversal sequences in filenames, potentially leading to remote code execution. The vulnerability impacts instances where file uploads and document search by content is enabled (FileSettings.EnableFileAttachments = true and FileSettings.ExtractContent = true). These configuration settings are enabled by default.

Reserved 2025-05-20 | Published 2025-06-20 | Updated 2025-06-20 | Assigner Mattermost


CRITICAL: 9.9CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Problem types

CWE-427: Uncontrolled Search Path Element

Product status

Default status
unaffected

10.5.0
affected

9.11.0
affected

10.8.0
affected

10.7.0
affected

10.6.0
affected

10.9.0
unaffected

10.5.6
unaffected

9.11.16
unaffected

10.8.1
unaffected

10.7.3
unaffected

10.6.6
unaffected

Credits

Dawid Kulikowski (daw10) finder

References

mattermost.com/security-updates

cve.org (CVE-2025-4981)

nvd.nist.gov (CVE-2025-4981)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-4981

Support options

Helpdesk Chat, Email, Knowledgebase