Metrics
Affected Vendors & Products
Solution
Update Mattermost to versions 10.9.0, 10.8.2, 10.7.4, 10.5.8, 9.11.17 or higher.
Workaround
No workaround given by the vendor.
Link | Providers |
---|---|
https://mattermost.com/security-updates |
![]() ![]() |
Thu, 02 Oct 2025 20:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Mattermost mattermost Server
|
|
CPEs | cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:* | |
Vendors & Products |
Mattermost mattermost Server
|
Fri, 18 Jul 2025 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 18 Jul 2025 09:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Mattermost versions 10.8.x <= 10.8.1, 10.7.x <= 10.7.3, 10.5.x <= 10.5.7, 9.11.x <= 9.11.16 fail to sanitize input paths of file attachments in the bulk import JSONL file, which allows a system admin to read arbitrary system files via path traversal. | |
Title | Arbitrary file read by system admin via path traversal | |
Weaknesses | CWE-22 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Mattermost
Published:
Updated: 2025-07-18T12:30:35.494Z
Reserved: 2025-06-18T13:06:31.030Z
Link: CVE-2025-6233

Updated: 2025-07-18T11:37:49.030Z

Status : Analyzed
Published: 2025-07-18T10:15:34.940
Modified: 2025-10-02T19:49:31.937
Link: CVE-2025-6233

No data.

Updated: 2025-07-21T15:17:12Z