CVE-2025-36530
BaseFortify
Publication date: 2025-08-21
Last updated on: 2025-08-25
Assigner: Mattermost, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| mattermost | mattermost_server | From 9.11.0 (inc) to 9.11.18 (exc) |
| mattermost | mattermost_server | From 10.5.0 (inc) to 10.5.9 (exc) |
| mattermost | mattermost_server | From 10.8.0 (inc) to 10.8.4 (exc) |
| mattermost | mattermost_server | From 10.9.0 (inc) to 10.9.2 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-22 | The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in certain Mattermost versions where the software fails to properly validate file paths during plugin import operations. This flaw allows restricted admin users to exploit path traversal to install unauthorized custom plugins, bypassing plugin signature enforcement and marketplace restrictions.
How can this vulnerability impact me? :
The vulnerability can allow restricted admin users to install unauthorized plugins, potentially leading to the introduction of malicious or unverified code into the Mattermost environment. This could compromise the integrity of the system and lead to unauthorized actions or data exposure.