
We found results for “”
CVE-2025-4981
Good to know:

Date: June 20, 2025
Mattermost versions 10.5.x <= 10.5.5, 9.11.x <= 9.11.15, 10.8.x <= 10.8.0, 10.7.x <= 10.7.2, 10.6.x <= 10.6.5 fail to sanitize filenames in the archive extractor which allows authenticated users to write files to arbitrary locations on the filesystem via uploading archives with path traversal sequences in filenames, potentially leading to remote code execution. The vulnerability impacts instances where file uploads and document search by content is enabled (FileSettings.EnableFileAttachments = true and FileSettings.ExtractContent = true). These configuration settings are enabled by default.
Severity Score
Related Resources (6)
Severity Score
Weakness Type (CWE)
Uncontrolled Search Path Element
CWE-427Top Fix

Upgrade Version
Upgrade to version github.com/mattermost/mattermost - v9.11.16;github.com/mattermost/mattermost - 10.5.6;github.com/mattermost/mattermost - 10.6.5;github.com/mattermost/mattermost - 10.7.3;github.com/mattermost/mattermost - v10.8.1;github.com/mattermost/mattermost-server - v0.0.0-20250519205859-65aec10162f6;github.com/mattermost/mattermost/server/v8 - v8.0.0-20250519205859-65aec10162f6
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | LOW |
User Interaction (UI): | NONE |
Scope (S): | CHANGED |
Confidentiality (C): | HIGH |
Integrity (I): | HIGH |
Availability (A): | HIGH |