CVE-2025-6227
BaseFortify
Publication date: 2025-07-18
Last updated on: 2025-10-14
Assigner: Mattermost, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| mattermost | mattermost_server | From 9.11.0 (inc) to 9.11.17 (exc) |
| mattermost | mattermost_server | From 10.5.0 (inc) to 10.5.8 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-522 | The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability affects certain versions of Mattermost (10.5.x up to 10.5.7 and 9.11.x up to 9.11.16). It occurs because the software fails to negotiate a new token when accepting an invite. As a result, an attacker who intercepts both the invite and the password can send synchronization payloads to the server that originally created the invite via the REST API.
How can this vulnerability impact me? :
An attacker who intercepts both the invite and password can exploit this vulnerability to send synchronization payloads to the server via the REST API. This could potentially allow unauthorized actions or data manipulation on the server that created the invite, impacting the integrity of the system.