We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-6233

Arbitrary file read by system admin via path traversal



Description

Mattermost versions 10.8.x <= 10.8.1, 10.7.x <= 10.7.3, 10.5.x <= 10.5.7, 9.11.x <= 9.11.16 fail to sanitize input paths of file attachments in the bulk import JSONL file, which allows a system admin to read arbitrary system files via path traversal.

Reserved 2025-06-18 | Published 2025-07-18 | Updated 2025-07-18 | Assigner Mattermost


MEDIUM: 6.8CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N

Problem types

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

Default status
unaffected

10.8.0
affected

10.7.0
affected

10.5.0
affected

9.11.0
affected

10.9.0
unaffected

10.8.2
unaffected

10.7.4
unaffected

10.5.8
unaffected

9.11.17
unaffected

Credits

Dawid Kulikowski (daw10) finder

References

mattermost.com/security-updates

cve.org (CVE-2025-6233)

nvd.nist.gov (CVE-2025-6233)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-6233

Support options

Helpdesk Chat, Email, Knowledgebase