Vulnerability Details CVE-2025-12419
Mattermost versions 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12, 11.0.x <= 11.0.3 fail to properly validate OAuth state tokens during OpenID Connect authentication which allows an authenticated attacker with team creation privileges to take over a user account via manipulation of authentication data during the OAuth completion flow. This requires email verification to be disabled (default: disabled), OAuth/OpenID Connect to be enabled, and the attacker to control two users in the SSO system with one of them never having logged into Mattermost.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 20.8%
CVSS Severity
CVSS v3 Score 9.9
Products affected by CVE-2025-12419
-
cpe:2.3:a:mattermost:mattermost_server:10.11.0
-
cpe:2.3:a:mattermost:mattermost_server:10.11.1
-
cpe:2.3:a:mattermost:mattermost_server:10.11.2
-
cpe:2.3:a:mattermost:mattermost_server:10.11.3
-
cpe:2.3:a:mattermost:mattermost_server:10.11.4
-
cpe:2.3:a:mattermost:mattermost_server:10.12.0
-
cpe:2.3:a:mattermost:mattermost_server:10.12.1
-
cpe:2.3:a:mattermost:mattermost_server:10.5.0
-
cpe:2.3:a:mattermost:mattermost_server:10.5.1
-
cpe:2.3:a:mattermost:mattermost_server:10.5.10
-
cpe:2.3:a:mattermost:mattermost_server:10.5.11
-
cpe:2.3:a:mattermost:mattermost_server:10.5.12
-
cpe:2.3:a:mattermost:mattermost_server:10.5.2
-
cpe:2.3:a:mattermost:mattermost_server:10.5.3
-
cpe:2.3:a:mattermost:mattermost_server:10.5.4
-
cpe:2.3:a:mattermost:mattermost_server:10.5.5
-
cpe:2.3:a:mattermost:mattermost_server:10.5.6
-
cpe:2.3:a:mattermost:mattermost_server:10.5.7
-
cpe:2.3:a:mattermost:mattermost_server:10.5.8
-
cpe:2.3:a:mattermost:mattermost_server:10.5.9
-
cpe:2.3:a:mattermost:mattermost_server:11.0.0
-
cpe:2.3:a:mattermost:mattermost_server:11.0.1
-
cpe:2.3:a:mattermost:mattermost_server:11.0.2
-
cpe:2.3:a:mattermost:mattermost_server:11.0.3