Mattermost versions 10.5.x <= 10.5.7, 9.11.x <= 9.11.16 fail to negotiate a new token when accepting the invite which allows a user that intercepts both invite and password to send synchronization payloads to the server that originally created the invite via the REST API.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://mattermost.com/security-updates |
![]() ![]() |
History
Fri, 18 Jul 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 18 Jul 2025 12:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Mattermost versions 10.5.x <= 10.5.7, 9.11.x <= 9.11.16 fail to negotiate a new token when accepting the invite which allows a user that intercepts both invite and password to send synchronization payloads to the server that originally created the invite via the REST API. | |
Title | Invite token is used as part of the secure communication | |
Weaknesses | CWE-522 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Mattermost
Published: 2025-07-18T11:39:46.005Z
Updated: 2025-07-18T13:44:00.998Z
Reserved: 2025-06-18T10:41:49.989Z
Link: CVE-2025-6227

Updated: 2025-07-18T13:43:58.146Z

Status : Awaiting Analysis
Published: 2025-07-18T12:15:23.843
Modified: 2025-07-22T13:06:27.983
Link: CVE-2025-6227

No data.