CVE-2025-13321
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-17

Last updated on: 2025-12-18

Assigner: Mattermost, Inc.

Description
Mattermost Desktop App versions <6.0.0 fail to sanitize sensitive information from Mattermost logs and clear data on server deletion which allows an attacker with access to the users system to gain access to potentially sensitive information via reading the application logs.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-17
Last Modified
2025-12-18
Generated
2026-05-07
AI Q&A
2025-12-18
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
mattermost mattermost_desktop to 6.0.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-532 The product writes sensitive information to a log file.
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, update the Mattermost Desktop App to version 6.0.0 or later, as versions prior to 6.0.0 fail to sanitize sensitive information from logs and do not clear data on server deletion. Additionally, restrict access to the user's system to prevent unauthorized access to application logs.


Can you explain this vulnerability to me?

Mattermost Desktop App versions prior to 6.0.0 do not properly sanitize sensitive information from application logs and fail to clear data when a server is deleted. This flaw allows an attacker who has access to the user's system to read the application logs and potentially obtain sensitive information.


How can this vulnerability impact me? :

An attacker with access to your system could exploit this vulnerability to read Mattermost application logs that contain sensitive information. This could lead to unauthorized disclosure of sensitive data stored in the logs.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart