CVE-2025-4573
BaseFortify
Publication date: 2025-06-11
Last updated on: 2025-07-08
Assigner: Mattermost, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| mattermost | mattermost_server | From 9.11.0 (inc) to 9.11.14 (exc) |
| mattermost | mattermost_server | From 10.5.0 (inc) to 10.5.5 (exc) |
| mattermost | mattermost_server | From 10.6.0 (inc) to 10.6.4 (exc) |
| mattermost | mattermost_server | From 10.7.0 (inc) to 10.7.2 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-90 | The product constructs all or part of an LDAP query using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended LDAP query when it is sent to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in certain versions of Mattermost where the software fails to properly validate LDAP group ID attributes. Specifically, an authenticated administrator with the PermissionSysconsoleWriteUserManagementGroups permission can exploit this by injecting LDAP search filters through the PUT /api/v4/ldap/groups/{remote_id}/link API when objectGUID is used as the Group ID Attribute. This improper validation allows LDAP search filter injection.
How can this vulnerability impact me? :
The vulnerability allows an authenticated administrator to perform LDAP search filter injection, which could lead to unauthorized access or manipulation of LDAP group data. Although the CVSS score indicates a low to medium severity (4.1), it can impact the confidentiality of information by potentially exposing or altering LDAP group memberships.