
We found results for “”
CVE-2025-9072
Good to know:


Date: September 15, 2025
Mattermost versions 10.10.x <= 10.10.1, 10.5.x <= 10.5.9, 10.9.x <= 10.9.4 fail to validate the redirect_to parameter, allowing an attacker to craft a malicious link that, once a user authenticates with their SAML provider, could post the user’s cookies to an attacker-controlled URL.
Severity Score
Related Resources (8)
Severity Score
Weakness Type (CWE)
URL Redirection to Untrusted Site ('Open Redirect')
CWE-601Top Fix

Upgrade Version
Upgrade to version github.com/mattermost/mattermost - v10.5.10;github.com/mattermost/mattermost - v10.9.5;github.com/mattermost/mattermost - v10.10.2;github.com/mattermost/mattermost-server - v10.10.2;github.com/mattermost/mattermost-server - v10.5.10;github.com/mattermost/mattermost-server - v10.9.5;github.com/mattermost/mattermost/server/v8 - v8.0.0-20250731063404-9eebaadf8f72
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | LOW |
User Interaction (UI): | REQUIRED |
Scope (S): | UNCHANGED |
Confidentiality (C): | HIGH |
Integrity (I): | HIGH |
Availability (A): | LOW |