Cyber Posture

CVE-2025-25279

Critical

Published: 24 February 2025

Published
24 February 2025
Modified
02 October 2025
KEV Added
Patch
CVSS Score 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.5574 98.1th percentile
Risk Priority 53 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-25279 is a critical-severity Path Traversal (CWE-22) vulnerability in Mattermost Mattermost Server. Its CVSS base score is 9.9 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 1.9% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires validation of board import archive blocks to block path traversal payloads that enable arbitrary server file reads.

prevent

Mandates timely identification, reporting, and correction of the specific board import validation flaw across affected Mattermost versions.

prevent

Requires vulnerability scanning of Mattermost installations to detect and remediate this path traversal vulnerability before exploitation.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
Why these techniques?

Path traversal in Mattermost Boards import allows exploitation of the network-accessible application (T1190) to read arbitrary local system files (T1005).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Mattermost versions 10.4.x <= 10.4.1, 9.11.x <= 9.11.7, 10.3.x <= 10.3.2, 10.2.x <= 10.2.2 fail to properly validate board blocks when importing boards which allows an attacker could read any arbitrary file on the system via importing and exporting a…

more

specially crafted import archive in Boards.

Deeper analysisAI

CVE-2025-25279 affects Mattermost versions 10.4.x up to and including 10.4.1, 9.11.x up to 9.11.7, 10.3.x up to 10.3.2, and 10.2.x up to 10.2.2. The vulnerability arises from a failure to properly validate board blocks when importing boards in the Boards feature, classified under CWE-22 (Path Traversal). This flaw allows an attacker to read arbitrary files on the system by importing and then exporting a specially crafted import archive. It carries a CVSS v3.1 base score of 9.9 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H) and was published on 2025-02-24.

An authenticated attacker with low privileges (PR:L) can exploit this over the network (AV:N) with low complexity (AC:L) and no user interaction (UI:N). By creating a malicious board import archive, the attacker imports it into a board and exports it, enabling arbitrary file reads on the server. The scope change (S:C) amplifies impact, resulting in high confidentiality, integrity, and availability consequences (C:H/I:H/A:H).

Mitigation details are available in the Mattermost security advisories at https://mattermost.com/security-updates.

Details

CWE(s)

Affected Products

mattermost
mattermost server
9.11.0 — 9.11.8 · 10.2.0 — 10.2.3 · 10.3.0 — 10.3.3

CVEs Like This One

CVE-2025-20051Same product: Mattermost Mattermost Server
CVE-2025-14273Same product: Mattermost Mattermost Server
CVE-2025-25274Same product: Mattermost Mattermost Server
CVE-2025-25068Same product: Mattermost Mattermost Server
CVE-2025-20621Same product: Mattermost Mattermost Server
CVE-2025-24490Same product: Mattermost Mattermost Server
CVE-2026-3108Same product: Mattermost Mattermost Server
CVE-2026-2454Same product: Mattermost Mattermost Server
CVE-2026-28741Same product: Mattermost Mattermost Server
CVE-2025-1412Same product: Mattermost Mattermost Server

References