CVE-2025-9072

Mattermost versions 10.10.x <= 10.10.1, 10.5.x <= 10.5.9, 10.9.x <= 10.9.4 fail to validate the redirect_to parameter, allowing an attacker to craft a malicious link that, once a user authenticates with their SAML provider, could post the user’s cookies to an attacker-controlled URL.
References
Link Resource
https://mattermost.com/security-updates Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*
cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*
cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*

History

16 Sep 2025, 16:00

Type Values Removed Values Added
CPE cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*
References () https://mattermost.com/security-updates - () https://mattermost.com/security-updates - Vendor Advisory
First Time Mattermost
Mattermost mattermost Server

15 Sep 2025, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-15 11:15

Updated : 2025-09-16 16:00


NVD link : CVE-2025-9072

Mitre link : CVE-2025-9072

CVE.ORG link : CVE-2025-9072


JSON object : View

Products Affected

mattermost

  • mattermost_server
CWE
CWE-601

URL Redirection to Untrusted Site ('Open Redirect')