We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-20033

DoS via custom post type for sysconsole plugin readers



Description

Mattermost versions 10.2.0, 9.11.x <= 9.11.5, 10.0.x <= 10.0.3, 10.1.x <= 10.1.3 fail to properly validate post types, which allows attackers to deny service to users with the sysconsole_read_plugins permission via creating a post with the custom_pl_notification type and specific props.

Reserved 2025-01-08 | Published 2025-01-09 | Updated 2025-01-09 | Assigner Mattermost


MEDIUM: 4.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

Problem types

CWE-1287: Improper Validation of Specified Type of Input

Product status

Default status
unaffected

10.2.0
affected

9.11.0
affected

10.0.0
affected

10.1.0
affected

10.3.0
unaffected

10.2.1
unaffected

9.11.6
unaffected

10.0.4
unaffected

10.1.4
unaffected

Credits

c0rydoras (c0rydoras) finder

References

mattermost.com/security-updates

cve.org (CVE-2025-20033)

nvd.nist.gov (CVE-2025-20033)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2025-20033

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.