{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-4981","assignerOrgId":"9302f53e-dde5-4bf3-b2f2-a83f91ac0eee","state":"PUBLISHED","assignerShortName":"Mattermost","dateReserved":"2025-05-20T06:57:13.788Z","datePublished":"2025-06-20T10:27:13.471Z","dateUpdated":"2025-06-20T13:10:32.981Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Mattermost","vendor":"Mattermost","versions":[{"lessThanOrEqual":"10.5.5","status":"affected","version":"10.5.0","versionType":"semver"},{"lessThanOrEqual":"9.11.15","status":"affected","version":"9.11.0","versionType":"semver"},{"lessThanOrEqual":"10.8.0","status":"affected","version":"10.8.0","versionType":"semver"},{"lessThanOrEqual":"10.7.2","status":"affected","version":"10.7.0","versionType":"semver"},{"lessThanOrEqual":"10.6.5","status":"affected","version":"10.6.0","versionType":"semver"},{"version":"10.9.0","status":"unaffected"},{"version":"10.5.6","status":"unaffected"},{"version":"9.11.16","status":"unaffected"},{"version":"10.8.1","status":"unaffected"},{"version":"10.7.3","status":"unaffected"},{"version":"10.6.6","status":"unaffected"}]}],"credits":[{"lang":"en","type":"finder","value":"Dawid Kulikowski (daw10)"}],"descriptions":[{"lang":"en","value":"Mattermost versions 10.5.x <= 10.5.5, 9.11.x <= 9.11.15, 10.8.x <= 10.8.0, 10.7.x <= 10.7.2, 10.6.x <= 10.6.5 fail to sanitize filenames in the archive extractor which allows authenticated users to write files to arbitrary locations on the filesystem via uploading archives with path traversal sequences in filenames, potentially leading to remote code execution. The vulnerability impacts instances where file uploads and document search by content is enabled (FileSettings.EnableFileAttachments = true and FileSettings.ExtractContent = true). These configuration settings are enabled by default."}],"metrics":[{"cvssV3_1":{"attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H","baseSeverity":"CRITICAL","baseScore":9.9},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"lang":"en","type":"CWE","description":"CWE-427: Uncontrolled Search Path Element","cweId":"CWE-427"}]}],"references":[{"url":"https://mattermost.com/security-updates"}],"solutions":[{"value":"Update Mattermost to versions 10.9.0, 10.5.6, 9.11.16, 10.8.1, 10.7.3, 10.6.6 or higher.","lang":"en"}],"source":{"advisory":"MMSA-2025-00491","defect":["https://mattermost.atlassian.net/browse/MM-64336"],"discovery":"EXTERNAL"},"title":"Path Traversal Leading to RCE by Any Authenticated Mattermost User","providerMetadata":{"orgId":"9302f53e-dde5-4bf3-b2f2-a83f91ac0eee","shortName":"Mattermost","dateUpdated":"2025-06-20T10:29:47.620Z"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-06-20T13:06:30.529064Z","id":"CVE-2025-4981","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-06-20T13:10:32.981Z"}}]}}