{"id":"CVE-2025-9079","details":"Mattermost versions 10.8.x \u003c= 10.8.3, 10.5.x \u003c= 10.5.8, 9.11.x \u003c= 9.11.17, 10.10.x \u003c= 10.10.1, 10.9.x \u003c= 10.9.3 fail to validate import directory path configuration which allows admin users to execute arbitrary code via malicious plugin upload to prepackaged plugins directory","aliases":["GHSA-qx3f-6vq3-8j8m","GO-2025-3977"],"modified":"2026-03-23T05:31:41.453847Z","published":"2025-09-19T20:15:40.540Z","related":["SUSE-SU-2025:3799-1","openSUSE-SU-2025:15576-1"],"references":[{"type":"ADVISORY","url":"https://mattermost.com/security-updates"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/mattermost/mattermost-server","events":[{"introduced":"0bc2ddd42375a75ab14e63f038165150d4f07659"},{"fixed":"11c36f4d1e44c36a85aa682becaa7519f63761cf"},{"introduced":"58bd34fd34cbd7d3da777d627b6cffdf8a532930"},{"fixed":"c602a4a78e1f60b9a97ee5bce509ecad4177340c"},{"introduced":"bb105f3a2785636ad53b2d0bf4027900d41f6a67"},{"fixed":"6880f9b5908f20c6c4db1456d3a27603af01dd72"},{"introduced":"14775836a78c8257de08fff229d364755346eff9"},{"fixed":"3b7a835de6c3e0a43212516f91d7e679daa56bb6"},{"introduced":"c8bd5c937551a4e9ad23f5a4fd8aaf7604d046dd"},{"fixed":"70c3cb2c1eef66484d5455217295684a49b7c3f1"}],"database_specific":{"versions":[{"introduced":"9.11.0"},{"fixed":"9.11.18"},{"introduced":"10.5.0"},{"fixed":"10.5.9"},{"introduced":"10.8.0"},{"fixed":"10.8.4"},{"introduced":"10.9.0"},{"fixed":"10.9.4"},{"introduced":"10.10.0"},{"fixed":"10.10.2"}]}}],"versions":["@mattermost/client@10.5.0","@mattermost/client@10.8.0","@mattermost/client@9.11.0","@mattermost/types@10.5.0","@mattermost/types@10.8.0","@mattermost/types@9.11.0","mattermost-redux@10.8.0","v10.10.0","v10.10.1","v10.10.1-rc1","v10.10.2-rc1","v10.10.2-rc2","v10.10.2-rc3","v10.10.2-rc4","v10.5.0","v10.5.0-rc6","v10.5.1","v10.5.1-rc1","v10.5.1-rc2","v10.5.2","v10.5.3","v10.5.3-rc1","v10.5.4","v10.5.4-rc1","v10.5.4-rc2","v10.5.5","v10.5.5-rc1","v10.5.6","v10.5.6-rc1","v10.5.7","v10.5.8","v10.5.8-rc1","v10.5.9-rc1","v10.5.9-rc2","v10.5.9-rc3","v10.5.9-rc4","v10.8.0","v10.8.0-rc3","v10.8.1","v10.8.2","v10.8.3","v10.8.4-rc1","v10.8.4-rc2","v10.8.4-rc3","v10.8.4-rc4","v10.9.0","v10.9.0-rc4","v10.9.1","v10.9.2","v10.9.2-rc1","v10.9.3","v10.9.3-rc1","v10.9.3-rc2","v10.9.3-rc3","v10.9.3-rc4","v10.9.4-rc1","v9.11.0","v9.11.0-rc3","v9.11.1","v9.11.1-rc1","v9.11.10","v9.11.10-rc1","v9.11.11","v9.11.11-rc1","v9.11.12","v9.11.12-rc1","v9.11.13","v9.11.13-rc1","v9.11.14","v9.11.15","v9.11.16","v9.11.16-rc1","v9.11.17","v9.11.17-rc1","v9.11.18-rc1","v9.11.18-rc2","v9.11.18-rc3","v9.11.18-rc4","v9.11.2","v9.11.2-rc1","v9.11.2-rc2","v9.11.3","v9.11.3-rc1","v9.11.3-rc2","v9.11.4","v9.11.4-rc1","v9.11.5","v9.11.5-rc1","v9.11.6","v9.11.6-rc1","v9.11.6-rc2","v9.11.7","v9.11.7-rc1","v9.11.7-rc2","v9.11.7-rc3","v9.11.8","v9.11.9","v9.11.9-rc1","v9.11.9-rc2"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-9079.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}]}