CVE-2025-4573: Mattermost allows authenticated administrator to execute LDAP search filter injection
Mattermost versions 10.7.x <= 10.7.1, 10.6.x <= 10.6.3, 10.5.x <= 10.5.4, 9.11.x <= 9.11.13 fail to properly validate LDAP group ID attributes, allowing an authenticated administrator with PermissionSysconsoleWriteUserManagementGroups permission to execute LDAP search filter injection via the PUT /api/v4/ldap/groups/{remote_id}/link API when objectGUID is configured as the Group ID Attribute.
References
- github.com/advisories/GHSA-4r67-4x4p-fprg
- github.com/mattermost/mattermost
- github.com/mattermost/mattermost/commit/1f9c688a30847eeb7bfb1574dc7bbb9f011afbf7
- github.com/mattermost/mattermost/commit/64a65c6107877382040297b3ef215c689caaed74
- github.com/mattermost/mattermost/commit/77892234944bc7476b20794e516538bcac717de9
- github.com/mattermost/mattermost/commit/b33926709b956a59558cc7fef80c0e75a769ce81
- github.com/mattermost/mattermost/commit/b47e89c4f98cb6ad9f1dceb79325aa94e80f963a
- mattermost.com/security-updates
- nvd.nist.gov/vuln/detail/CVE-2025-4573
Code Behaviors & Features
Detect and mitigate CVE-2025-4573 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →