CVE-2025-6227

Mattermost versions 10.5.x <= 10.5.7, 9.11.x <= 9.11.16 fail to negotiate a new token when accepting the invite which allows a user that intercepts both invite and password to send synchronization payloads to the server that originally created the invite via the REST API.
References
Link Resource
https://mattermost.com/security-updates Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*
cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*

History

14 Oct 2025, 14:32

Type Values Removed Values Added
First Time Mattermost mattermost Server
Mattermost
References () https://mattermost.com/security-updates - () https://mattermost.com/security-updates - Vendor Advisory
CPE cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*

22 Jul 2025, 13:06

Type Values Removed Values Added
Summary
  • (es) Las versiones de Mattermost 10.5.x &lt;= 10.5.7, 9.11.x &lt;= 9.11.16 no pueden negociar un nuevo token al aceptar la invitación, lo que permite que un usuario que intercepta tanto la invitación como la contraseña envíe payloads de sincronización al servidor que creó originalmente la invitación a través de la API REST.

18 Jul 2025, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-18 12:15

Updated : 2025-10-14 14:32


NVD link : CVE-2025-6227

Mitre link : CVE-2025-6227

CVE.ORG link : CVE-2025-6227


JSON object : View

Products Affected

mattermost

  • mattermost_server
CWE
CWE-522

Insufficiently Protected Credentials