CVE-2025-13326
BaseFortify
Publication date: 2025-12-17
Last updated on: 2025-12-18
Assigner: Mattermost, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| mattermost | mattermost_desktop | to 6.0.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-693 | The product does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
Mattermost Desktop App versions prior to 6.0.0 do not enable the Hardened Runtime when packaged for the Mac App Store. This allows an attacker to copy the app binary to a temporary folder and inherit TCC (Transparency, Consent, and Control) permissions, potentially bypassing security restrictions.
How can this vulnerability impact me? :
This vulnerability can allow an attacker with limited privileges to gain access to permissions normally granted to the Mattermost Desktop App, potentially leading to unauthorized access to protected resources or data on a Mac system.