Mattermost versions 10.8.x <= 10.8.1, 10.7.x <= 10.7.3, 10.5.x <= 10.5.7, 9.11.x <= 9.11.16 fail to sanitize input paths of file attachments in the bulk import JSONL file, which allows a system admin to read arbitrary system files via path traversal.
Fixes

Solution

Update Mattermost to versions 10.9.0, 10.8.2, 10.7.4, 10.5.8, 9.11.17 or higher.


Workaround

No workaround given by the vendor.

References
History

Thu, 02 Oct 2025 20:00:00 +0000

Type Values Removed Values Added
First Time appeared Mattermost mattermost Server
CPEs cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*
Vendors & Products Mattermost mattermost Server

Fri, 18 Jul 2025 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 18 Jul 2025 09:30:00 +0000

Type Values Removed Values Added
Description Mattermost versions 10.8.x <= 10.8.1, 10.7.x <= 10.7.3, 10.5.x <= 10.5.7, 9.11.x <= 9.11.16 fail to sanitize input paths of file attachments in the bulk import JSONL file, which allows a system admin to read arbitrary system files via path traversal.
Title Arbitrary file read by system admin via path traversal
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 6.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Mattermost

Published:

Updated: 2025-07-18T12:30:35.494Z

Reserved: 2025-06-18T13:06:31.030Z

Link: CVE-2025-6233

cve-icon Vulnrichment

Updated: 2025-07-18T11:37:49.030Z

cve-icon NVD

Status : Analyzed

Published: 2025-07-18T10:15:34.940

Modified: 2025-10-02T19:49:31.937

Link: CVE-2025-6233

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-07-21T15:17:12Z