AI description
CVE-2025-4981 affects certain versions of Mattermost. It's a path traversal vulnerability found in the archive extractor. The vulnerability allows authenticated users to write files to arbitrary locations on the filesystem by uploading archives containing path traversal sequences in filenames. This vulnerability can lead to remote code execution. The issue exists in instances where file uploads and document search by content are enabled (FileSettings.EnableFileAttachments = true and FileSettings.ExtractContent = true), which are the default settings.
- Description
- Mattermost versions 10.5.x <= 10.5.5, 9.11.x <= 9.11.15, 10.8.x <= 10.8.0, 10.7.x <= 10.7.2, 10.6.x <= 10.6.5 fail to sanitize filenames in the archive extractor which allows authenticated users to write files to arbitrary locations on the filesystem via uploading archives with path traversal sequences in filenames, potentially leading to remote code execution. The vulnerability impacts instances where file uploads and document search by content is enabled (FileSettings.EnableFileAttachments = true and FileSettings.ExtractContent = true). These configuration settings are enabled by default.
- Source
- responsibledisclosure@mattermost.com
- NVD status
- Analyzed
- Products
- mattermost_server
CVSS 3.1
- Type
- Secondary
- Base score
- 9.9
- Impact score
- 6
- Exploitability score
- 3.1
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
- Severity
- CRITICAL
- responsibledisclosure@mattermost.com
- CWE-427
- Hype score
- Not currently trending
- #VulnerabilityReport #CollaborationPlatform Critical Mattermost Flaw (CVE-2025-4981, CVSS 9.9) Allows RCE Via Path Traversal https://t.co/MmNCIwFJ8N https://t.co/KbzjPnEVan - @Komodosec - 27 Jul 2025 - 57 Impressions - 0 Retweets - 0 Likes - 0 Bookmarks - 0 Replies - 0 Quotes 
- 🚨Alert🚨CVE-2025-4981(CVSS 9.9) : A critical flaw in Mattermost allows authenticated users to achieve RCE via path traversal during archive uploads. 📊113K+Services are found on the https://t.co/ysWb28Crld yearly. 🔗Hunter Link:https://t.co/WVx0lW1PAP 👇Query HUNTER : - @HunterMapping - 25 Jun 2025 - 3308 Impressions - 10 Retweets - 48 Likes - 22 Bookmarks - 2 Replies - 1 Quote 
- Warning: Critical #Path #Traversal vulnerability in #Mattermost! #CVE-2025-4981 CVSS: 9.9. Authenticated users can exploit this for #RCE under default settings. #RCE! #Patch #Patch #Patch. Read our advisory here: https://t.co/MYOTBbTrUL - @CCBalert - 23 Jun 2025 - 13 Impressions - 0 Retweets - 0 Likes - 0 Bookmarks - 0 Replies - 0 Quotes 
- CVE-2025-4981: RCE in Mattermost, 9.9 rating 🔥 Recently patched vulnerability in Mattermost allowed attackers to write files to arbitrary locations on the host system. Search at https://t.co/hv7QKSqxTR: 👉 Link: https://t.co/d59scIY22t #cybersecurity #vulnerability_map ht - @Netlas_io - 23 Jun 2025 - 133 Impressions - 1 Retweet - 2 Likes - 0 Bookmarks - 0 Replies - 0 Quotes 
- ⚠️⚠️ CVE-2025-4981(CVSS 9.9)allows authenticated users to write files to arbitrary locations on the host system—opening the door to remote code execution. 🎯97k+ Results are found on the https://t.co/pb16tGYaKe nearly year. 🔗FOFA Link:https://t.co/bRJ5LAaio1 FO - @fofabot - 23 Jun 2025 - 2027 Impressions - 6 Retweets - 23 Likes - 10 Bookmarks - 0 Replies - 0 Quotes 
- オープンソースのコラボレーションプラットフォームMattermostに、深刻なリモートコード実行の脆弱性(CVE-2025-4981など)が発見された。 CVSSスコアは9.9で、認証済みユーザーが任意のファイルをホスト上に書き - @yousukezan - 21 Jun 2025 - 625 Impressions - 0 Retweets - 1 Like - 0 Bookmarks - 0 Replies - 0 Quotes 
- A critical flaw (CVE-2025-4981, CVSS 9.9) in Mattermost allows authenticated users to achieve RCE via path traversal during archive uploads. Update immediately! #Mattermost #RCE #Cybersecurity #OpenSource #Vulnerability https://t.co/6EUfPZYuE8 - @the_yellow_fall - 21 Jun 2025 - 1855 Impressions - 8 Retweets - 23 Likes - 6 Bookmarks - 0 Replies - 0 Quotes 
- CVE-2025-4981 Mattermost versions 10.5.x <= 10.5.5, 9.11.x <= 9.11.15, 10.8.x <= 10.8.0, 10.7.x <= 10.7.2, 10.6.x <= 10.6.5 fail to sanitize filenames in the archive extractor which … https://t.co/GhlB06rIaj - @CVEnew - 20 Jun 2025 - 366 Impressions - 0 Retweets - 0 Likes - 0 Bookmarks - 0 Replies - 0 Quotes 
- [CVE-2025-4981: CRITICAL] Critical security vulnerability in Mattermost versions 10.5.x <= 10.5.5, 9.11.x <= 9.11.15, 10.8.x <= 10.8.0, 10.7.x <= 10.7.2, 10.6.x <= 10.6.5 allows remote code execution. Update now!#cve,CVE-2025-4981,#cybersecurity https://t.co/wlTeMH - @CveFindCom - 20 Jun 2025 - 71 Impressions - 0 Retweets - 0 Likes - 1 Bookmark - 0 Replies - 0 Quotes 
[
  {
    "nodes": [
      {
        "negate": false,
        "cpeMatch": [
          {
            "criteria": "cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*",
            "vulnerable": true,
            "matchCriteriaId": "9CEF0379-7E63-452C-8084-067092A25D92",
            "versionEndExcluding": "9.11.16",
            "versionStartIncluding": "9.11.0"
          },
          {
            "criteria": "cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*",
            "vulnerable": true,
            "matchCriteriaId": "77EE1558-3E63-4178-90EB-DBC8F99B75AB",
            "versionEndExcluding": "10.5.6",
            "versionStartIncluding": "10.5.0"
          },
          {
            "criteria": "cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*",
            "vulnerable": true,
            "matchCriteriaId": "5E1A952E-F96B-4D50-B8FD-7CAFFE73263F",
            "versionEndExcluding": "10.6.6",
            "versionStartIncluding": "10.6.0"
          },
          {
            "criteria": "cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*",
            "vulnerable": true,
            "matchCriteriaId": "28D55588-A52A-4ADD-AC90-A46BED4555A1",
            "versionEndExcluding": "10.7.3",
            "versionStartIncluding": "10.7.0"
          },
          {
            "criteria": "cpe:2.3:a:mattermost:mattermost_server:10.8.0:-:*:*:*:*:*:*",
            "vulnerable": true,
            "matchCriteriaId": "20DB174F-F76D-49F1-BB44-638A5FA71CDA"
          },
          {
            "criteria": "cpe:2.3:a:mattermost:mattermost_server:10.8.0:rc1:*:*:*:*:*:*",
            "vulnerable": true,
            "matchCriteriaId": "51CA3B67-FE72-49C2-97EA-D7D86F3991EE"
          },
          {
            "criteria": "cpe:2.3:a:mattermost:mattermost_server:10.8.0:rc2:*:*:*:*:*:*",
            "vulnerable": true,
            "matchCriteriaId": "8C4DBC6F-061B-4844-9E80-596D4890DA2A"
          },
          {
            "criteria": "cpe:2.3:a:mattermost:mattermost_server:10.8.0:rc3:*:*:*:*:*:*",
            "vulnerable": true,
            "matchCriteriaId": "AA2C469A-7A94-4C55-9738-21C16B8C0817"
          }
        ],
        "operator": "OR"
      }
    ]
  }
]