CVE-2025-9079: Mattermost Path Traversal vulnerability
(updated )
Mattermost versions 10.8.x <= 10.8.3, 10.5.x <= 10.5.8, 9.11.x <= 9.11.17, 10.10.x <= 10.10.1, 10.9.x <= 10.9.3 fail to validate import directory path configuration which allows admin users to execute arbitrary code via malicious plugin upload to prepackaged plugins directory
References
- github.com/advisories/GHSA-qx3f-6vq3-8j8m
- github.com/mattermost/mattermost
- github.com/mattermost/mattermost/commit/047a2c64071749367fe02d2162f6103a3d31a883
- github.com/mattermost/mattermost/commit/439464883aa16a329c23cd6274c4cca7e88e238f
- github.com/mattermost/mattermost/commit/4ff68eea0a3f3777032d31a1a82f4b1fb492a1ac
- github.com/mattermost/mattermost/commit/96665b9b98a17534fcd515982a2eb26950581e41
- github.com/mattermost/mattermost/commit/a8fa77f107efe83f09a779f8e67cbecf236b0032
- github.com/mattermost/mattermost/commit/b38e2eccda182212a8032539658723c7d87e0b7e
- mattermost.com/security-updates
- nvd.nist.gov/vuln/detail/CVE-2025-9079
- pkg.go.dev/vuln/GO-2025-3977
Code Behaviors & Features
Detect and mitigate CVE-2025-9079 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →