CVE-2025-9072: Mattermost Open Redirect vulnerability
(updated )
Mattermost versions 10.10.x <= 10.10.1, 10.5.x <= 10.5.9, 10.9.x <= 10.9.4 fail to validate the redirect_to parameter, allowing an attacker to craft a malicious link that, once a user authenticates with their SAML provider, could post the user’s cookies to an attacker-controlled URL.
References
- github.com/advisories/GHSA-69j8-prx2-vx98
- github.com/mattermost/mattermost
- github.com/mattermost/mattermost/commit/13cd76009d31754db46115bddef5287a8a29871a
- github.com/mattermost/mattermost/commit/9eebaadf8f720788e99b6997337c8df330271326
- github.com/mattermost/mattermost/commit/fda403fb6ec41bea8780bff198a26860f105e6e5
- mattermost.com/security-updates
- nvd.nist.gov/vuln/detail/CVE-2025-9072
Code Behaviors & Features
Detect and mitigate CVE-2025-9072 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →