First published: Thu Apr 24 2025(Updated: )
Mattermost versions 10.4.x <= 10.4.2, 10.5.x <= 10.5.0, 9.11.x <= 9.11.10 fail to validate the uniqueness and quantity of task actions within the UpdateRunTaskActions GraphQL operation, which allows an attacker to create task items containing an excessive number of actions triggered by specific posts, overloading the server and leading to a denial-of-service (DoS) condition.
Credit: responsibledisclosure@mattermost.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mattermost | <=10.4.2<=10.5.0<=9.11.10 | |
go/github.com/mattermost/mattermost-plugin-playbooks | <1.41.0 | 1.41.0 |
go/github.com/mattermost/mattermost/server/v8 | >=9.11.0<9.11.11 | |
go/github.com/mattermost/mattermost/server/v8 | >=10.5.0<10.5.1 | |
go/github.com/mattermost/mattermost/server/v8 | >=10.4.0<10.4.3 | |
go/github.com/mattermost/mattermost-plugin-playbooks | >=2.0.0<2.1.1 | |
go/github.com/mattermost/mattermost/server/v8 | <8.0.0-20250218121836-2b5275d87136 | 8.0.0-20250218121836-2b5275d87136 |
Update Mattermost to versions 10.6.0, 10.4.3, 10.5.1, 9.11.11 or higher. Alternatively, update the Mattermost Playbooks plugin to version 2.1.1 or higher.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-35965 has a medium severity rating due to its potential to allow attackers to create task items with excessive actions.
To resolve CVE-2025-35965, upgrade Mattermost to versions 10.4.3, 10.5.1, or newer than 9.11.10.
CVE-2025-35965 affects Mattermost versions 10.4.x up to 10.4.2, 10.5.x up to 10.5.0, and 9.11.x up to 9.11.10.
CVE-2025-35965 allows an attacker to create task items that can trigger an excessive number of actions, potentially leading to denial of service.
Currently, there are no known workarounds for CVE-2025-35965, and upgrading is strongly recommended.