--- licence_title: Creative Commons Attribution 4.0 International (CC-BY 4.0) licence_link: https://creativecommons.org/licenses/by/4.0/ licence_restrictions: https://cert.europa.eu/legal-notice licence_author: The Cybersecurity Service for the Union institutions, bodies, offices and agencies title: 'Critical Vulnerabilities inĀ Mattermost' number: '2025-006' version: '1.0' original_date: '2025-03-05' date: '2025-03-05' --- _History:_ * _05/03/2025 --- v1.0 -- Initial publication_ # Summary On 23 January 2025, Mattermost used advisories for several vulnerabilities, including three critical severity flaws affecting the Board plugin [1]. If exploited, these vulnerabilities could allow an authenticated attacker to read any file on the server, or read data directly from the database. It is recommended to check for potential abuse, and to update vulnerable Mattermost instances. # Technical Details The vulnerability **CVE-2025-25279**, with a CVSS score of 9.9, arises due to a failure to validate board blocks during import processes. An attacker can exploit this vulnerability by importing a specially crafted archive. Upon successful exploitation, the attacker can read arbitrary files on the targeted system [2]. The vulnerability **CVE-2025-20051**, with a CVSS score of 9.9, arises due to a failure to validate user input during the patching and duplication of a board. Maliciously crafted blocks can be used to read arbitrary files on the system by an attacker [3]. The vulnerability **CVE-2025-24490**, with a CVSS score of 9.6, stems from the application's failure to utilise prepared statements in SQL queries when reordering boards categories. An attacker can exploit this vulnerability through SQL injection, gaining the ability to retrieve sensitive data from the database [4]. # Products Affected Those vulnerabilities affect Mattermost versions 10.4.x up to 10.4.1, 9.11.x up to 9.11.7, 10.3.x up to 10.3.2, and 10.2.x up to 10.2.2 where the Boards plugin is enabled. # Recommendations CERT-EU recommends updating to the latest version of the affected Mattermost instance as soon as possible to mitigate those vulnerabilities. For Internet facing applications, it is recommended using a Web Application Firewall (WAF) to detect or prevent most common vulnerability types exploitation [5]. ## Detection To detect possible exploitations of **CVE-2025-25279** or **CVE-2025-20051**, it is possible to review the `fields` column of the table `focalboard_blocks` in the database for common LFI payloads (e.g. `../..`). When request bodies are being logged (in HTTP or WAF logs), it is also recommended to review POST requests related to the `focalboard` API endpoint for common LFI payloads (e.g. `../..`), especially in the `fields` variable [6]. # References [1] [2] [3] [4] [5] [6]