CVE-2025-12421: Mattermost fails to to verify the token used during code exchange
(updated )
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
References
- github.com/advisories/GHSA-mp6x-97xj-9x62
- github.com/mattermost/mattermost
- github.com/mattermost/mattermost/commit/5072bbf689a46b3b97b2373f26149f5891396e6b
- github.com/mattermost/mattermost/commit/acda1fb5dd46a2f46c76ae67012423c760525eaa
- github.com/mattermost/mattermost/commit/f361e7d75a7ab9df5a2106e1ceb919b94b55e41d
- github.com/mattermost/mattermost/commit/feb598ed2b7ac3cb78a253b032ad7e4628b0de00
- mattermost.com/security-updates
- nvd.nist.gov/vuln/detail/CVE-2025-12421
Code Behaviors & Features
Detect and mitigate CVE-2025-12421 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →