We found results for “”
CVE-2025-9079
Good to know:
Date: September 19, 2025
Mattermost versions 10.8.x <= 10.8.3, 10.5.x <= 10.5.8, 9.11.x <= 9.11.17, 10.10.x <= 10.10.1, 10.9.x <= 10.9.3 fail to validate import directory path configuration which allows admin users to execute arbitrary code via malicious plugin upload to prepackaged plugins directory
Severity Score
Related Resources (12)
Severity Score
Weakness Type (CWE)
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE-22Top Fix
Upgrade Version
Upgrade to version github.com/mattermost/mattermost-server - v10.8.4;github.com/mattermost/mattermost-server - v10.5.9;github.com/mattermost/mattermost-server - v9.11.18;github.com/mattermost/mattermost-server - v10.10.2;github.com/mattermost/mattermost-server - v10.9.4;github.com/mattermost/mattermost-server - v9.11.18+incompatible;github.com/mattermost/mattermost/server/v8 - v8.0.0-20250707221302-a8fa77f107ef
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | HIGH |
| Privileges Required (PR): | HIGH |
| User Interaction (UI): | NONE |
| Scope (S): | CHANGED |
| Confidentiality (C): | HIGH |
| Integrity (I): | HIGH |
| Availability (A): | HIGH |
Vulnerabilities
Projects
Contact Us


