Metrics
Affected Vendors & Products
Solution
Update Mattermost to versions 10.11.0, 10.8.4, 10.5.9, 9.11.18, 10.10.2, 10.9.4 or higher.
Workaround
No workaround given by the vendor.
Link | Providers |
---|---|
https://mattermost.com/security-updates |
![]() ![]() |
Fri, 19 Sep 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 19 Sep 2025 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Mattermost versions 10.8.x <= 10.8.3, 10.5.x <= 10.5.8, 9.11.x <= 9.11.17, 10.10.x <= 10.10.1, 10.9.x <= 10.9.3 fail to validate import directory path configuration which allows admin users to execute arbitrary code via malicious plugin upload to prepackaged plugins directory | |
Title | Admin RCE via prepackaged plugins by way of misconfigured imports directory | |
Weaknesses | CWE-22 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Mattermost
Published:
Updated: 2025-09-19T19:45:22.181Z
Reserved: 2025-08-15T15:42:04.648Z
Link: CVE-2025-9079

Updated: 2025-09-19T19:45:14.408Z

Status : Received
Published: 2025-09-19T20:15:40.540
Modified: 2025-09-19T20:15:40.540
Link: CVE-2025-9079

No data.

No data.