{"id":"CVE-2025-20088","details":"Mattermost versions 10.2.x \u003c= 10.2.0, 9.11.x \u003c= 9.11.5, 10.0.x \u003c= 10.0.3, 10.1.x \u003c= 10.1.3 fail to properly validate post props which allows a malicious authenticated user to cause a crash via a malicious post.","aliases":["GHSA-45v9-w9fh-33j6","GO-2025-3394"],"modified":"2026-04-10T05:22:05.763044Z","published":"2025-01-15T17:15:19.243Z","related":["CGA-8gvc-qx2m-47p9","SUSE-SU-2025:0297-1","openSUSE-SU-2025:14704-1"],"references":[{"type":"ADVISORY","url":"https://mattermost.com/security-updates"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/mattermost/mattermost-server","events":[{"introduced":"0bc2ddd42375a75ab14e63f038165150d4f07659"},{"fixed":"51ac054df0cf662ef3fa4657df4e058a33687135"},{"introduced":"2d83d21388f3111bffe4b1f63521b21d77ec2cef"},{"fixed":"ff3c76437efdef1fdf44f92434ac588e4d4e964c"},{"introduced":"50f91e2453188bbd0153db0e98714022db022a5c"},{"fixed":"90937a3832837b2d193c25aada123ee88942ebed"},{"introduced":"0"},{"last_affected":"9a578312304f06bb423d668fa8f1b975dc1fe79a"}],"database_specific":{"versions":[{"introduced":"9.11.0"},{"fixed":"9.11.6"},{"introduced":"10.0.0"},{"fixed":"10.0.4"},{"introduced":"10.1.0"},{"fixed":"10.1.4"},{"introduced":"0"},{"last_affected":"10.2.0"}]}}],"versions":["@mattermost/client@10.0.0","@mattermost/client@10.1.0","@mattermost/client@9.11.0","@mattermost/types@10.0.0","@mattermost/types@10.1.0","@mattermost/types@9.11.0","cloud-2022-07-20-1","cloud-2022-08-10-1","cloud-2022-09-08-1","cloud-2022-10-06-1","cloud-2022-11-11-1","cloud-2022-11-24-1","server/public/v0.0.10","server/public/v0.0.11","server/public/v0.0.12","server/public/v0.0.13","server/public/v0.0.14","server/public/v0.0.15","server/public/v0.0.16","server/public/v0.0.17","server/public/v0.0.18","server/public/v0.0.5","server/public/v0.0.6","server/public/v0.0.7","server/public/v0.0.8","server/public/v0.0.9","server/public/v0.1.0","server/public/v0.1.1","server/public/v0.1.2","server/public/v0.1.3","server/public/v0.1.4","server/public/v0.1.5","server/public/v0.1.6","server/public/v0.1.7","v0.5.0","v10.0.0","v10.0.0-rc4","v10.0.1","v10.0.1-rc1","v10.0.2","v10.0.2-rc1","v10.0.2-rc2","v10.0.3","v10.0.3-rc1","v10.0.4-rc1","v10.0.4-rc2","v10.1.0","v10.1.0-rc3","v10.1.1","v10.1.1-rc1","v10.1.2","v10.1.2-rc1","v10.1.3","v10.1.3-rc1","v10.1.4-rc1","v10.2.0","v10.2.0-rc1","v10.2.0-rc2","v10.2.0-rc3","v4.10.0-rc1","v4.2.0-rc1","v4.3.0-rc1","v4.4.0-rc1","v4.5.0-rc1","v4.6.0-rc1","v4.6.0-rc2","v4.7.0-rc1","v4.8.0-rc1","v4.9.0-rc1","v5.0.0-rc1","v5.1.0-rc1","v5.2.0-rc1","v5.2.0-rc2","v9.11.0","v9.11.0-rc3","v9.11.1","v9.11.1-rc1","v9.11.2","v9.11.2-rc1","v9.11.2-rc2","v9.11.3","v9.11.3-rc1","v9.11.3-rc2","v9.11.4","v9.11.4-rc1","v9.11.5","v9.11.5-rc1","v9.11.6-rc1","v9.11.6-rc2"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-20088.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}