Skip to content
New Report: Get your copy of The 2024 State of the Internet Report! | Download Today
Advisory

February 25 Advisory: Multiple Critical Vulnerabilities in Mattermost Collaboration Software

Date of Disclosure (source): January 23, 2025 (Published to NVD on February 24, 2025)

Three critical vulnerabilities have been identified in Mattermost, an open-source collaboration platform offering features similar to Slack or Microsoft Teams, including channels, direct messaging, DevOps integrations, playbooks and boards for task management.

These vulnerabilities specifically affect the boards feature in Mattermost, potentially exposing applications to arbitrary file reads and SQL injection attacks. Below is a breakdown of the vulnerabilities:

  • CVE-2025-00051 Arbitrary File Read via Board Duplication
    Due to improper input validation when duplicating a board, an attacker may insert a malicious block that allows them to read arbitrary files on the server.

  • CVE-2025-24490 SQL Injection via Board Reordering
    Mattermost fails to use prepared statements when executing SQL queries or reordering boards, enabling attackers to inject SQL commands to retrieve or manipulate database data.

  • CVE-2025-25279 Arbitrary File Read via Board Import
    Inadequate validation of board blocks when importing boards allows an attacker to reference system files within a specially crafted archive, leading to unauthorized file access.

Patches have been released by Mattermost to address each of these vulnerabilities. At the time of writing, there is no knowledge of active exploitation of these vulnerabilities or any public exploit code available. 

Field Details
CVE-ID
  • CVE-2025-00051 – CVSS 9.9 (critical) – assigned by Mattermost
  • CVE-2025-24490 – CVSS 9.6 (critical) – assigned by Mattermost
  • CVE-2025-25279 – CVSS 9.9 (critical) – assigned by Mattermost
Vulnerability Description
  • CVE-2025-00051 – Mattermost does not properly validate input while duplicating a board, allowing an attacker to read arbitrary files by inserting a malicious block that is then processed in an unintended way. 
  • CVE-2025-24490 – Mattermost does not use prepared statements when executing SQL queries for reordering boards, allowing an attacker to inject SQL commands.
  • CVE-2025-25279 – Mattermost does not properly validate board blocks when importing boards, allowing an attacker to include references to system files in an imported archive.
Date of Disclosure January 23, 2025 (Published to NVD on February 24, 2025)
Affected Assets
  • CVE-2025-00051 – Mattermost boards (when duplicating boards)
  • CVE-2025-24490 – Mattermost boards (when reordering boards)
  • CVE-2025-25279 – Mattermost board blocks (when importing boards)
Vulnerable Software Versions  All three vulnerabilities affect the same Mattermost versions:

  • 10.4.x ≤ 10.4.1
  • 9.11.x ≤ 9.11.7
  • 10.3.x ≤ 10.3.2
  • 10.2.x ≤ 10.2.2
PoC Available? We did not observe any public exploits available at the time of writing. 
Exploitation Status We did not observe this vulnerability on CISA’s list of known exploited vulnerabilities or in GreyNoise at the time of writing.
Patch Status These vulnerabilities have been fixed in the following Mattermost versions: 

  • 10.4.x ≤ 10.4.1 – fixed in 10.4.2
  • 9.11.x ≤ 9.11.7 – fixed in 9.11.8
  • 10.3.x ≤ 10.3.2 – fixed in 10.3.3
  • 10.2.x ≤ 10.2.2 – fixed in 10.2.3

Censys Perspective

At the time of writing, Censys observed 166,645 Mattermost applications, 4,564 of which were exposing a vulnerable version. The other exposed applications also displayed versions, but they were either patched or outside the affected version ranges listed above. See the table below for the eight vulnerable versions we saw exposed:

Version Host Count
9.11.0 2418
9.11.2 952
9.11.6 587
9.11.1 297
9.11.5 107
9.11.7 77
9.11.4 65
9.11.3 61

Map of EXPOSED hosts that are POTENTIALLY VULNERABLE:

Censys Search Query:

services.software: (product="Mattermost") and not labels: {honeypot, tarpit}

Censys ASM Query:

host.services.software.product="Mattermost" and not host.labels: {honeypot, tarpit}

Risk:

risks.name = "Vulnerable Mattermost [CVE-2025-20051, CVE-2025-25279, & CVE-2025-24490]"

References

Attack Surface Management Solutions
Learn more