First published: Mon Apr 14 2025(Updated: )
Mattermost versions 10.5.x <= 10.5.1, 10.4.x <= 10.4.3, 9.11.x <= 9.11.9 fail to invalidate the cache when a user account is converted to a bot which allows an attacker to login to the bot exactly one time via normal credentials.
Credit: responsibledisclosure@mattermost.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mattermost | <=10.5.1<=10.4.3<=9.11.9 | |
go/github.com/mattermost/mattermost/server/v8 | >=10.4.0<10.4.4 | 10.4.4 |
go/github.com/mattermost/mattermost/server/v8 | <8.0.0-20250220161544-fd356b62b4dd | 8.0.0-20250220161544-fd356b62b4dd |
go/github.com/mattermost/mattermost/server/v8 | >=9.11.0<9.11.10 | 9.11.10 |
go/github.com/mattermost/mattermost/server/v8 | >=10.5.0<10.5.2 | 10.5.2 |
Update Mattermost to versions 10.6.0, 10.5.2, 10.4.4, 9.11.10 or higher.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-2475 is classified as a high severity vulnerability due to its potential to allow unauthorized access to user accounts.
To fix CVE-2025-2475, upgrade Mattermost to versions 10.5.2 or later, 10.4.4 or later, or 9.11.10 or later.
CVE-2025-2475 affects Mattermost versions 10.5.x up to 10.5.1, 10.4.x up to 10.4.3, and 9.11.x up to 9.11.9.
CVE-2025-2475 can facilitate an attack where an unauthorized individual can log in to a bot account using normal user credentials.
There are no recommended workarounds for CVE-2025-2475, and an upgrade is necessary to mitigate the vulnerability.