Mattermost versions 10.8.x <= 10.8.3, 10.5.x <= 10.5.8, 9.11.x <= 9.11.17, 10.10.x <= 10.10.1, 10.9.x <= 10.9.3 fail to validate import directory path configuration which allows admin users to execute arbitrary code via malicious plugin upload to prepackaged plugins directory
Fixes

Solution

Update Mattermost to versions 10.11.0, 10.8.4, 10.5.9, 9.11.18, 10.10.2, 10.9.4 or higher.


Workaround

No workaround given by the vendor.

References
History

Fri, 19 Sep 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 19 Sep 2025 19:30:00 +0000

Type Values Removed Values Added
Description Mattermost versions 10.8.x <= 10.8.3, 10.5.x <= 10.5.8, 9.11.x <= 9.11.17, 10.10.x <= 10.10.1, 10.9.x <= 10.9.3 fail to validate import directory path configuration which allows admin users to execute arbitrary code via malicious plugin upload to prepackaged plugins directory
Title Admin RCE via prepackaged plugins by way of misconfigured imports directory
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 8, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Mattermost

Published:

Updated: 2025-09-19T19:45:22.181Z

Reserved: 2025-08-15T15:42:04.648Z

Link: CVE-2025-9079

cve-icon Vulnrichment

Updated: 2025-09-19T19:45:14.408Z

cve-icon NVD

Status : Received

Published: 2025-09-19T20:15:40.540

Modified: 2025-09-19T20:15:40.540

Link: CVE-2025-9079

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.