CVE-2025-9072Open Redirect in Mattermost Mattermost-server

Severity
5.4MEDIUMNVD
CNA7.6
EPSS
0.0%
top 90.75%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 15
Latest updateSep 17

Description

Mattermost versions 10.10.x <= 10.10.1, 10.5.x <= 10.5.9, 10.9.x <= 10.9.4 fail to validate the redirect_to parameter, allowing an attacker to craft a malicious link that, once a user authenticates with their SAML provider, could post the user’s cookies to an attacker-controlled URL.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NExploitability: 2.3 | Impact: 2.7

Affected Packages4 packages

NVDmattermost/mattermost_server10.5.010.5.10+2
Gogithub.com/mattermost_mattermost-server10.5.0+incompatible10.5.10+incompatible+5
Gogithub.com/mattermost_mattermost_server_v8< 8.0.0-20250731063404-9eebaadf8f72
CVEListV5mattermost/mattermost10.10.010.10.1+2

🔴Vulnerability Details

4
OSV
Mattermost Open Redirect vulnerability in github.com/mattermost/mattermost-server2025-09-17
CVEList
One-Click Mattermost Account Takeover via Poisoned RelayState SAML Parameter2025-09-15
OSV
Mattermost Open Redirect vulnerability2025-09-15
GHSA
Mattermost Open Redirect vulnerability2025-09-15

📋Vendor Advisories

1
Microsoft
An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd) as distributed in GNU Binutils 2.32. It is an attempted excessive memory allocation in setup_group in elf.c.2019-02-12
CVE-2025-9072 — Open Redirect | cvebase