CVE-2025-20033Improper Validation of Specified Type of Input in Mattermost Mattermost-server

Severity
6.5MEDIUMNVD
CNA4.3
EPSS
0.2%
top 63.67%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 9

Description

Mattermost versions 10.2.0, 9.11.x <= 9.11.5, 10.0.x <= 10.0.3, 10.1.x <= 10.1.3 fail to properly validate post types, which allows attackers to deny service to users with the sysconsole_read_plugins permission via creating a post with the custom_pl_notification type and specific props.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 2.8 | Impact: 3.6

Affected Packages4 packages

NVDmattermost/mattermost_server9.11.09.11.6+3
Gogithub.com/mattermost_mattermost-server10.0.0+incompatible10.0.4+incompatible+2
CVEListV5mattermost/mattermost9.11.09.11.5+3

🔴Vulnerability Details

4
CVEList
DoS via custom post type for sysconsole plugin readers2025-01-09
GHSA
Mattermost Improper Validation of Specified Type of Input vulnerability2025-01-09
OSV
Mattermost Improper Validation of Specified Type of Input vulnerability in github.com/mattermost/mattermost-server2025-01-09
OSV
Mattermost Improper Validation of Specified Type of Input vulnerability2025-01-09

📋Vendor Advisories

1
Red Hat
mattermost: DoS via custom post type for sysconsole plugin readers2025-01-09
CVE-2025-20033 — MEDIUM severity | cvebase