Mattermost versions 10.5.x <= 10.5.7, 9.11.x <= 9.11.16 fail to negotiate a new token when accepting the invite which allows a user that intercepts both invite and password to send synchronization payloads to the server that originally created the invite via the REST API.
References
History

Fri, 18 Jul 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 18 Jul 2025 12:00:00 +0000

Type Values Removed Values Added
Description Mattermost versions 10.5.x <= 10.5.7, 9.11.x <= 9.11.16 fail to negotiate a new token when accepting the invite which allows a user that intercepts both invite and password to send synchronization payloads to the server that originally created the invite via the REST API.
Title Invite token is used as part of the secure communication
Weaknesses CWE-522
References
Metrics cvssV3_1

{'score': 2.2, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Mattermost

Published: 2025-07-18T11:39:46.005Z

Updated: 2025-07-18T13:44:00.998Z

Reserved: 2025-06-18T10:41:49.989Z

Link: CVE-2025-6227

cve-icon Vulnrichment

Updated: 2025-07-18T13:43:58.146Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-07-18T12:15:23.843

Modified: 2025-07-22T13:06:27.983

Link: CVE-2025-6227

cve-icon Redhat

No data.