{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-20T20:41:19.339","vulnerabilities":[{"cve":{"id":"CVE-2025-4981","sourceIdentifier":"responsibledisclosure@mattermost.com","published":"2025-06-20T11:15:20.993","lastModified":"2025-07-08T17:59:42.473","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Mattermost versions 10.5.x <= 10.5.5, 9.11.x <= 9.11.15, 10.8.x <= 10.8.0, 10.7.x <= 10.7.2, 10.6.x <= 10.6.5 fail to sanitize filenames in the archive extractor which allows authenticated users to write files to arbitrary locations on the filesystem via uploading archives with path traversal sequences in filenames, potentially leading to remote code execution. The vulnerability impacts instances where file uploads and document search by content is enabled (FileSettings.EnableFileAttachments = true and FileSettings.ExtractContent = true). These configuration settings are enabled by default."},{"lang":"es","value":"Las versiones de Mattermost 10.5.x &lt;= 10.5.5, 9.11.x &lt;= 9.11.15, 10.8.x &lt;= 10.8.0, 10.7.x &lt;= 10.7.2 y 10.6.x &lt;= 10.6.5 no depuran los nombres de archivo en el extractor de archivos, lo que permite a los usuarios autenticados escribir archivos en ubicaciones arbitrarias del sistema de archivos mediante la carga de archivos con secuencias de path traversal en los nombres de archivo, lo que podría provocar la ejecución remota de código. Esta vulnerabilidad afecta a las instancias donde la carga de archivos y la búsqueda de documentos por contenido están habilitadas (FileSettings.EnableFileAttachments = true y FileSettings.ExtractContent = true). Estas opciones de configuración están habilitadas por defecto."}],"metrics":{"cvssMetricV31":[{"source":"responsibledisclosure@mattermost.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H","baseScore":9.9,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.1,"impactScore":6.0}]},"weaknesses":[{"source":"responsibledisclosure@mattermost.com","type":"Secondary","description":[{"lang":"en","value":"CWE-427"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*","versionStartIncluding":"9.11.0","versionEndExcluding":"9.11.16","matchCriteriaId":"9CEF0379-7E63-452C-8084-067092A25D92"},{"vulnerable":true,"criteria":"cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*","versionStartIncluding":"10.5.0","versionEndExcluding":"10.5.6","matchCriteriaId":"77EE1558-3E63-4178-90EB-DBC8F99B75AB"},{"vulnerable":true,"criteria":"cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*","versionStartIncluding":"10.6.0","versionEndExcluding":"10.6.6","matchCriteriaId":"5E1A952E-F96B-4D50-B8FD-7CAFFE73263F"},{"vulnerable":true,"criteria":"cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*","versionStartIncluding":"10.7.0","versionEndExcluding":"10.7.3","matchCriteriaId":"28D55588-A52A-4ADD-AC90-A46BED4555A1"},{"vulnerable":true,"criteria":"cpe:2.3:a:mattermost:mattermost_server:10.8.0:-:*:*:*:*:*:*","matchCriteriaId":"20DB174F-F76D-49F1-BB44-638A5FA71CDA"},{"vulnerable":true,"criteria":"cpe:2.3:a:mattermost:mattermost_server:10.8.0:rc1:*:*:*:*:*:*","matchCriteriaId":"51CA3B67-FE72-49C2-97EA-D7D86F3991EE"},{"vulnerable":true,"criteria":"cpe:2.3:a:mattermost:mattermost_server:10.8.0:rc2:*:*:*:*:*:*","matchCriteriaId":"8C4DBC6F-061B-4844-9E80-596D4890DA2A"},{"vulnerable":true,"criteria":"cpe:2.3:a:mattermost:mattermost_server:10.8.0:rc3:*:*:*:*:*:*","matchCriteriaId":"AA2C469A-7A94-4C55-9738-21C16B8C0817"}]}]}],"references":[{"url":"https://mattermost.com/security-updates","source":"responsibledisclosure@mattermost.com","tags":["Vendor Advisory"]}]}}]}