Mattermost versions 10.4.x <= 10.4.1, 9.11.x <= 9.11.7, 10.3.x <= 10.3.2, 10.2.x <= 10.2.2 fail to properly validate input when patching and duplicating a board, which allows a user to read any arbitrary file on the system via duplicating a specially crafted block in Boards.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-4306 Mattermost versions 10.4.x <= 10.4.1, 9.11.x <= 9.11.7, 10.3.x <= 10.3.2, 10.2.x <= 10.2.2 fail to properly validate input when patching and duplicating a board, which allows a user to read any arbitrary file on the system via duplicating a specially crafted block in Boards.
Github GHSA Github GHSA GHSA-v469-7wp6-7cvp Mattermost allows reading arbitrary files
Fixes

Solution

Update Mattermost to versions 10.5.0, 10.4.2, 9.11.8, 10.3.3, 10.2.3 or higher. Alternatively, update the Mattermost Boards plugin to v9.0.5 or higher.


Workaround

No workaround given by the vendor.

References
History

Mon, 18 Aug 2025 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Mattermost mattermost Server
CPEs cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*
Vendors & Products Mattermost mattermost Server

Mon, 24 Feb 2025 12:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 24 Feb 2025 07:45:00 +0000

Type Values Removed Values Added
Description Mattermost versions 10.4.x <= 10.4.1, 9.11.x <= 9.11.7, 10.3.x <= 10.3.2, 10.2.x <= 10.2.2 fail to properly validate input when patching and duplicating a board, which allows a user to read any arbitrary file on the system via duplicating a specially crafted block in Boards.
Title Arbitrary file read via block duplication in Mattermost Boards
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 9.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Mattermost

Published:

Updated: 2025-02-24T11:20:04.651Z

Reserved: 2025-02-18T11:11:14.668Z

Link: CVE-2025-20051

cve-icon Vulnrichment

Updated: 2025-02-24T11:19:59.832Z

cve-icon NVD

Status : Analyzed

Published: 2025-02-24T08:15:10.087

Modified: 2025-08-18T18:22:38.053

Link: CVE-2025-20051

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-06-17T12:08:35Z