Vulnerability Details CVE-2025-12421
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 20.8%
CVSS Severity
CVSS v3 Score 9.9
Products affected by CVE-2025-12421
-
cpe:2.3:a:mattermost:mattermost_server:10.11.0
-
cpe:2.3:a:mattermost:mattermost_server:10.11.1
-
cpe:2.3:a:mattermost:mattermost_server:10.11.2
-
cpe:2.3:a:mattermost:mattermost_server:10.11.3
-
cpe:2.3:a:mattermost:mattermost_server:10.11.4
-
cpe:2.3:a:mattermost:mattermost_server:10.12.0
-
cpe:2.3:a:mattermost:mattermost_server:10.12.1
-
cpe:2.3:a:mattermost:mattermost_server:10.5.0
-
cpe:2.3:a:mattermost:mattermost_server:10.5.1
-
cpe:2.3:a:mattermost:mattermost_server:10.5.10
-
cpe:2.3:a:mattermost:mattermost_server:10.5.11
-
cpe:2.3:a:mattermost:mattermost_server:10.5.12
-
cpe:2.3:a:mattermost:mattermost_server:10.5.2
-
cpe:2.3:a:mattermost:mattermost_server:10.5.3
-
cpe:2.3:a:mattermost:mattermost_server:10.5.4
-
cpe:2.3:a:mattermost:mattermost_server:10.5.5
-
cpe:2.3:a:mattermost:mattermost_server:10.5.6
-
cpe:2.3:a:mattermost:mattermost_server:10.5.7
-
cpe:2.3:a:mattermost:mattermost_server:10.5.8
-
cpe:2.3:a:mattermost:mattermost_server:10.5.9
-
cpe:2.3:a:mattermost:mattermost_server:11.0.0
-
cpe:2.3:a:mattermost:mattermost_server:11.0.1
-
cpe:2.3:a:mattermost:mattermost_server:11.0.2