CVE-2025-12689Improper Validation of Specified Type of Input in Mattermost Mattermost-plugin-calls

Severity
6.5MEDIUMNVD
EPSS
0.1%
top 73.59%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 17
Latest updateDec 30

Description

Mattermost versions 11.0.x <= 11.0.4, 10.12.x <= 10.12.2, 10.11.x <= 10.11.6 fail to check WebSocket request field for proper UTF-8 format, which allows attacker to crash Calls plug-in via sending malformed request.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 2.8 | Impact: 3.6

Affected Packages3 packages

NVDmattermost/mattermost_server10.11.010.11.7+2
CVEListV5mattermost/mattermost11.0.011.0.4+2

🔴Vulnerability Details

4
OSV
Mattermost fails to check Websocket request for proper UTF-8 format potentially crashing Calls plug-in in github.com/mattermost/mattermost-plugin-calls2025-12-30
OSV
Mattermost fails to check Websocket request for proper UTF-8 format potentially crashing Calls plug-in2025-12-17
CVEList
DoS in Calls plugin via malformed UTF-8 in WebSocket request2025-12-17
GHSA
Mattermost fails to check Websocket request for proper UTF-8 format potentially crashing Calls plug-in2025-12-17

🕵️Threat Intelligence

1
Wiz
CVE-2025-12689 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2025-12689 — MEDIUM severity | cvebase