icon

We found results for “

CVE-2025-31363

Good to know:

icon

Date: April 16, 2025

Mattermost versions 10.4.x <= 10.4.2, 10.5.x <= 10.5.0, 9.11.x <= 9.11.9 fail to restrict domains the LLM can request to contact upstream which allows an authenticated user to exfiltrate data from an arbitrary server accessible to the victim via performing a prompt injection in the AI plugin's Jira tool.

Severity Score

Severity Score

Weakness Type (CWE)

Insertion of Sensitive Information Into Sent Data

CWE-201

Exposure of Sensitive System Information to an Unauthorized Control Sphere

CWE-497

Improper Validation of Generative AI Output

CWE-1426

Top Fix

icon

Upgrade Version

Upgrade to version github.com/mattermost/mattermost - v9.11.10;github.com/mattermost/mattermost - v10.4.3;github.com/mattermost/mattermost - v10.5.1;github.com/mattermost/mattermost/server/v8 - v8.0.0-20250218121836-2b5275d87136

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): HIGH
Privileges Required (PR): LOW
User Interaction (UI): REQUIRED
Scope (S): CHANGED
Confidentiality (C): LOW
Integrity (I): NONE
Availability (A): NONE

Do you need more information?

Contact Us