Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/mattermost/mattermost-server
  4. ›
  5. CVE-2025-9072

CVE-2025-9072: Mattermost Open Redirect vulnerability

September 15, 2025 (updated September 16, 2025)

Mattermost versions 10.10.x <= 10.10.1, 10.5.x <= 10.5.9, 10.9.x <= 10.9.4 fail to validate the redirect_to parameter, allowing an attacker to craft a malicious link that, once a user authenticates with their SAML provider, could post the user’s cookies to an attacker-controlled URL.

References

  • github.com/advisories/GHSA-69j8-prx2-vx98
  • github.com/mattermost/mattermost
  • github.com/mattermost/mattermost/commit/13cd76009d31754db46115bddef5287a8a29871a
  • github.com/mattermost/mattermost/commit/9eebaadf8f720788e99b6997337c8df330271326
  • github.com/mattermost/mattermost/commit/fda403fb6ec41bea8780bff198a26860f105e6e5
  • mattermost.com/security-updates
  • nvd.nist.gov/vuln/detail/CVE-2025-9072

Code Behaviors & Features

Detect and mitigate CVE-2025-9072 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 10.5.0 before 10.5.10, all versions starting from 10.9.0 before 10.9.5, all versions starting from 10.10.0 before 10.10.2

Fixed versions

  • 10.10.2
  • 10.5.10
  • 10.9.5

Solution

Upgrade to versions 10.10.2, 10.5.10, 10.9.5 or above.

Impact 7.6 HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L

Learn more about CVSS

Weakness

  • CWE-601: URL Redirection to Untrusted Site ('Open Redirect')

Source file

go/github.com/mattermost/mattermost-server/CVE-2025-9072.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Fri, 26 Sep 2025 12:21:26 +0000.