{"id":"CVE-2025-31363","details":"Mattermost versions 10.4.x \u003c= 10.4.2, 10.5.x \u003c= 10.5.0, 9.11.x \u003c= 9.11.9 fail to restrict domains the LLM can request to contact upstream which allows an authenticated user to exfiltrate data from an arbitrary server accessible to the victim via performing a prompt injection in the AI plugin's Jira tool.","aliases":["GHSA-9h6j-4ffx-cm84","GO-2025-3622"],"modified":"2026-04-10T05:25:01.428870Z","published":"2025-04-16T10:15:15.170Z","related":["CGA-rwm6-6rp6-x58x","openSUSE-SU-2025:15017-1"],"references":[{"type":"ADVISORY","url":"https://mattermost.com/security-updates"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/mattermost/mattermost-server","events":[{"introduced":"0bc2ddd42375a75ab14e63f038165150d4f07659"},{"fixed":"66f75be4b099a46587a044cdadc3693671271166"},{"introduced":"7c8c0b7464fa9cd2fbfb97c65d1475b4be2e765c"},{"fixed":"e644e3c8e3931a9432bbd23ff6a219c5664011e9"},{"introduced":"0"},{"last_affected":"58bd34fd34cbd7d3da777d627b6cffdf8a532930"}],"database_specific":{"versions":[{"introduced":"9.11.0"},{"fixed":"9.11.10"},{"introduced":"10.4.0"},{"fixed":"10.4.3"},{"introduced":"0"},{"last_affected":"10.5.0-NA"}]}}],"versions":["@mattermost/client@10.4.0","@mattermost/client@10.5.0","@mattermost/client@9.11.0","@mattermost/types@10.4.0","@mattermost/types@10.5.0","@mattermost/types@9.11.0","cloud-2022-07-20-1","cloud-2022-08-10-1","cloud-2022-09-08-1","cloud-2022-10-06-1","cloud-2022-11-11-1","cloud-2022-11-24-1","server/public/v0.0.10","server/public/v0.0.11","server/public/v0.0.12","server/public/v0.0.13","server/public/v0.0.14","server/public/v0.0.15","server/public/v0.0.16","server/public/v0.0.17","server/public/v0.0.18","server/public/v0.0.5","server/public/v0.0.6","server/public/v0.0.7","server/public/v0.0.8","server/public/v0.0.9","server/public/v0.1.0","server/public/v0.1.1","server/public/v0.1.2","server/public/v0.1.3","server/public/v0.1.4","server/public/v0.1.5","server/public/v0.1.6","server/public/v0.1.7","server/public/v0.1.8","server/public/v0.1.9","v0.5.0","v10.4.0","v10.4.0-rc3","v10.4.1","v10.4.2","v10.4.3-rc1","v10.4.3-rc2","v10.4.3-rc3","v10.5.0","v10.5.0-rc1","v10.5.0-rc2","v10.5.0-rc3","v10.5.0-rc4","v10.5.0-rc5","v10.5.0-rc6","v4.10.0-rc1","v4.2.0-rc1","v4.3.0-rc1","v4.4.0-rc1","v4.5.0-rc1","v4.6.0-rc1","v4.6.0-rc2","v4.7.0-rc1","v4.8.0-rc1","v4.9.0-rc1","v5.0.0-rc1","v5.1.0-rc1","v5.2.0-rc1","v5.2.0-rc2","v9.11.0","v9.11.0-rc3","v9.11.1","v9.11.1-rc1","v9.11.10-rc1","v9.11.2","v9.11.2-rc1","v9.11.2-rc2","v9.11.3","v9.11.3-rc1","v9.11.3-rc2","v9.11.4","v9.11.4-rc1","v9.11.5","v9.11.5-rc1","v9.11.6","v9.11.6-rc1","v9.11.6-rc2","v9.11.7","v9.11.7-rc1","v9.11.7-rc2","v9.11.7-rc3","v9.11.8","v9.11.9","v9.11.9-rc1","v9.11.9-rc2"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-31363.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}]}