CVE-2025-54499

Mattermost versions 10.5.x <= 10.5.10, 10.11.x <= 10.11.2 fail to use constant-time comparison for sensitive string comparisons which allows attackers to exploit timing oracles to perform byte-by-byte brute force attacks via response time analysis on Cloud API keys and OAuth client secrets
References
Link Resource
https://mattermost.com/security-updates Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*
cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*

History

21 Oct 2025, 17:58

Type Values Removed Values Added
First Time Mattermost mattermost Server
Mattermost
References () https://mattermost.com/security-updates - () https://mattermost.com/security-updates - Vendor Advisory
CPE cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*

16 Oct 2025, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-10-16 09:15

Updated : 2025-10-21 17:58


NVD link : CVE-2025-54499

Mitre link : CVE-2025-54499

CVE.ORG link : CVE-2025-54499


JSON object : View

Products Affected

mattermost

  • mattermost_server
CWE
CWE-208

Observable Timing Discrepancy