Cyber Posture

CVE-2025-25279

Critical

Published: 24 February 2025

Published
24 February 2025
Modified
02 October 2025
KEV Added
Patch
CVSS Score 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.5574 98.1th percentile
Risk Priority 53 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.

Security Summary

CVE-2025-25279 affects Mattermost versions 10.4.x up to and including 10.4.1, 9.11.x up to 9.11.7, 10.3.x up to 10.3.2, and 10.2.x up to 10.2.2. The vulnerability arises from a failure to properly validate board blocks when importing boards in the Boards feature, classified under CWE-22 (Path Traversal). This flaw allows an attacker to read arbitrary files on the system by importing and then exporting a specially crafted import archive. It carries a CVSS v3.1 base score of 9.9 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H) and was published on 2025-02-24.

An authenticated attacker with low privileges (PR:L) can exploit this over the network (AV:N) with low complexity (AC:L) and no user interaction (UI:N). By creating a malicious board import archive, the attacker imports it into a board and exports it, enabling arbitrary file reads on the server. The scope change (S:C) amplifies impact, resulting in high confidentiality, integrity, and availability consequences (C:H/I:H/A:H).

Mitigation details are available in the Mattermost security advisories at https://mattermost.com/security-updates.

Details

CWE(s)
CWE-22

Affected Products

mattermost
mattermost server
9.11.0 — 9.11.8 · 10.2.0 — 10.2.3 · 10.3.0 — 10.3.3

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
Why these techniques?

Path traversal in Mattermost Boards import allows exploitation of the network-accessible application (T1190) to read arbitrary local system files (T1005).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References