Mattermost versions 10.5.x <= 10.5.7, 9.11.x <= 9.11.16 fail to negotiate a new token when accepting the invite which allows a user that intercepts both invite and password to send synchronization payloads to the server that originally created the invite via the REST API.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-21876 Mattermost has Insufficiently Protected Credentials
Github GHSA Github GHSA GHSA-4fwj-8595-wp25 Mattermost has Insufficiently Protected Credentials
Fixes

Solution

Update Mattermost to versions 10.9.0, 10.5.8, 9.11.17 or higher.


Workaround

No workaround given by the vendor.

References
History

Tue, 14 Oct 2025 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Mattermost mattermost Server
CPEs cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*
Vendors & Products Mattermost mattermost Server

Fri, 18 Jul 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 18 Jul 2025 12:00:00 +0000

Type Values Removed Values Added
Description Mattermost versions 10.5.x <= 10.5.7, 9.11.x <= 9.11.16 fail to negotiate a new token when accepting the invite which allows a user that intercepts both invite and password to send synchronization payloads to the server that originally created the invite via the REST API.
Title Invite token is used as part of the secure communication
Weaknesses CWE-522
References
Metrics cvssV3_1

{'score': 2.2, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Mattermost

Published:

Updated: 2025-07-18T13:44:00.998Z

Reserved: 2025-06-18T10:41:49.989Z

Link: CVE-2025-6227

cve-icon Vulnrichment

Updated: 2025-07-18T13:43:58.146Z

cve-icon NVD

Status : Analyzed

Published: 2025-07-18T12:15:23.843

Modified: 2025-10-14T14:32:24.033

Link: CVE-2025-6227

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-07-21T15:17:09Z