Skip to main content

Uncontrolled Search Path Element

CVE-2025-4981

Severity High
Score 9.9/10

Summary

Mattermost versions fail to sanitize filenames in the archive extractor, which allows authenticated users to write files to arbitrary locations on the filesystem by uploading archives containing path traversal sequences in filenames. This vulnerability can potentially lead to Remote Code Execution. The issue affects instances where file uploads and document search by content are enabled (`FileSettings.EnableFileAttachments = true` and `FileSettings.ExtractContent = true`). These configuration settings are enabled by default. This issue affects versions 9.11.x prior to 9.11.16-rc1, 10.5.x prior to 10.5.6-rc1, 10.6.x prior to 10.6.6-rc1, 10.7.x prior to 10.7.3-rc1, and 10.8.x prior to 10.8.1.

  • LOW
  • NETWORK
  • HIGH
  • CHANGED
  • NONE
  • LOW
  • HIGH
  • HIGH

CWE-427 - Uncontrolled Search Path Element

The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.

Advisory Timeline

  • Published