Mattermost versions 10.8.x <= 10.8.1, 10.7.x <= 10.7.3, 10.5.x <= 10.5.7, 9.11.x <= 9.11.16 fail to sanitize input paths of file attachments in the bulk import JSONL file, which allows a system admin to read arbitrary system files via path traversal.
References
History

Fri, 18 Jul 2025 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 18 Jul 2025 09:30:00 +0000

Type Values Removed Values Added
Description Mattermost versions 10.8.x <= 10.8.1, 10.7.x <= 10.7.3, 10.5.x <= 10.5.7, 9.11.x <= 9.11.16 fail to sanitize input paths of file attachments in the bulk import JSONL file, which allows a system admin to read arbitrary system files via path traversal.
Title Arbitrary file read by system admin via path traversal
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 6.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Mattermost

Published: 2025-07-18T09:09:22.809Z

Updated: 2025-07-18T12:30:35.494Z

Reserved: 2025-06-18T13:06:31.030Z

Link: CVE-2025-6233

cve-icon Vulnrichment

Updated: 2025-07-18T11:37:49.030Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-07-18T10:15:34.940

Modified: 2025-07-22T13:06:27.983

Link: CVE-2025-6233

cve-icon Redhat

No data.