CVE-2025-55073: Mattermost allows an attacker to edit arbitrary posts via a crafted MSTeams plugin OAuth redirect URL
(updated )
Mattermost versions 10.11.x <= 10.11.3, 10.5.x <= 10.5.11, 10.12.x <= 10.12.0 fail to validate the relationship between the post being updated and the MSTeams plugin OAuth flow which allows an attacker to edit arbitrary posts via a crafted MSTeams plugin OAuth redirect URL.
References
- github.com/advisories/GHSA-ff85-qw3h-g9vp
- github.com/mattermost/mattermost
- github.com/mattermost/mattermost/commit/375ce229f4923205394d8f27925372b2cbf28130
- github.com/mattermost/mattermost/commit/6c288aa62bb3343183ec1d0a06360d14aa0193e9
- github.com/mattermost/mattermost/commit/a41db04d2746ab549d056db4ede4cd803f64989c
- github.com/mattermost/mattermost/commit/b822cea06bf5683a176e2c92711241bd29cd9389
- github.com/mattermost/mattermost/commit/e47349ea0fc072ee1dfb196d9bb1c8fd1a589224
- mattermost.com/security-updates
- nvd.nist.gov/vuln/detail/CVE-2025-55073
Code Behaviors & Features
Detect and mitigate CVE-2025-55073 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →