Home

Description

Mattermost versions 10.5.x <= 10.5.10, 10.11.x <= 10.11.2 fail to use constant-time comparison for sensitive string comparisons which allows attackers to exploit timing oracles to perform byte-by-byte brute force attacks via response time analysis on Cloud API keys and OAuth client secrets

PUBLISHED Reserved 2025-09-16 | Published 2025-10-16 | Updated 2025-10-16 | Assigner Mattermost




LOW: 3.1CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N

Problem types

CWE-208: Observable Timing Discrepancy

Product status

Default status
unaffected

10.5.0
affected

10.11.0
affected

10.12.0
unaffected

10.5.11
unaffected

10.11.3
unaffected

Credits

DoyenSec finder

References

mattermost.com/security-updates

cve.org (CVE-2025-54499)

nvd.nist.gov (CVE-2025-54499)

Download JSON