{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T18:49:13.658","vulnerabilities":[{"cve":{"id":"CVE-2025-3227","sourceIdentifier":"responsibledisclosure@mattermost.com","published":"2025-06-20T15:15:20.430","lastModified":"2025-07-08T14:31:06.530","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Mattermost versions 10.5.x <= 10.5.5, 9.11.x <= 9.11.15, 10.8.x <= 10.8.0, 10.7.x <= 10.7.2, 10.6.x <= 10.6.5 fail to properly enforce channel member management permissions in playbook runs, allowing authenticated users without the 'Manage Channel Members' permission to add or remove users from public and private channels by manipulating playbook run participants when the run is linked to a channel."},{"lang":"es","value":"Las versiones de Mattermost 10.5.x &lt;= 10.5.5, 9.11.x &lt;= 9.11.15, 10.8.x &lt;= 10.8.0, 10.7.x &lt;= 10.7.2, 10.6.x &lt;= 10.6.5 no aplican correctamente los permisos de administración de miembros del canal en las ejecuciones del libro de estrategias, lo que permite que los usuarios autenticados sin el permiso \"Administrar miembros del canal\" agreguen o eliminen usuarios de canales públicos y privados mediante la manipulación de los participantes de la ejecución del libro de estrategias cuando la ejecución está vinculada a un canal."}],"metrics":{"cvssMetricV31":[{"source":"responsibledisclosure@mattermost.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4}]},"weaknesses":[{"source":"responsibledisclosure@mattermost.com","type":"Secondary","description":[{"lang":"en","value":"CWE-863"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*","versionStartIncluding":"9.11.0","versionEndExcluding":"9.11.16","matchCriteriaId":"9CEF0379-7E63-452C-8084-067092A25D92"},{"vulnerable":true,"criteria":"cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*","versionStartIncluding":"10.5.0","versionEndExcluding":"10.5.6","matchCriteriaId":"77EE1558-3E63-4178-90EB-DBC8F99B75AB"},{"vulnerable":true,"criteria":"cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*","versionStartIncluding":"10.6.0","versionEndExcluding":"10.6.6","matchCriteriaId":"5E1A952E-F96B-4D50-B8FD-7CAFFE73263F"},{"vulnerable":true,"criteria":"cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*","versionStartIncluding":"10.7.0","versionEndExcluding":"10.7.3","matchCriteriaId":"28D55588-A52A-4ADD-AC90-A46BED4555A1"},{"vulnerable":true,"criteria":"cpe:2.3:a:mattermost:mattermost_server:10.8.0:-:*:*:*:*:*:*","matchCriteriaId":"20DB174F-F76D-49F1-BB44-638A5FA71CDA"},{"vulnerable":true,"criteria":"cpe:2.3:a:mattermost:mattermost_server:10.8.0:rc1:*:*:*:*:*:*","matchCriteriaId":"51CA3B67-FE72-49C2-97EA-D7D86F3991EE"},{"vulnerable":true,"criteria":"cpe:2.3:a:mattermost:mattermost_server:10.8.0:rc2:*:*:*:*:*:*","matchCriteriaId":"8C4DBC6F-061B-4844-9E80-596D4890DA2A"},{"vulnerable":true,"criteria":"cpe:2.3:a:mattermost:mattermost_server:10.8.0:rc3:*:*:*:*:*:*","matchCriteriaId":"AA2C469A-7A94-4C55-9738-21C16B8C0817"}]}]}],"references":[{"url":"https://mattermost.com/security-updates","source":"responsibledisclosure@mattermost.com","tags":["Vendor Advisory"]}]}}]}