We found results for “”
CVE-2025-6227
Good to know:
Date: July 18, 2025
Mattermost versions 10.5.x <= 10.5.7, 9.11.x <= 9.11.16 fail to negotiate a new token when accepting the invite which allows a user that intercepts both invite and password to send synchronization payloads to the server that originally created the invite via the REST API.
Severity Score
Related Resources (6)
Severity Score
Weakness Type (CWE)
Insufficiently Protected Credentials
CWE-522Top Fix
Upgrade Version
Upgrade to version github.com/mattermost/mattermost - v9.11.17;github.com/mattermost/mattermost - v10.5.8;github.com/mattermost/mattermost-server - v10.5.8;github.com/mattermost/mattermost-server - v9.11.17;github.com/mattermost/mattermost-server - v9.11.17+incompatible;github.com/mattermost/mattermost/server/v8 - v8.0.0-20250612074655-8f8612c63783
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | HIGH |
| Privileges Required (PR): | HIGH |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | NONE |
| Integrity (I): | LOW |
| Availability (A): | NONE |
Vulnerabilities
Projects
Contact Us


