Mattermost versions 10.7.x <= 10.7.0, 10.6.x <= 10.6.2, 10.5.x <= 10.5.3, 9.11.x <= 9.11.12 fails to properly invalidate personal access tokens upon user deactivation, allowing deactivated users to maintain full system access by exploiting access token validation flaws via continued usage of previously issued tokens.
References
History

Fri, 30 May 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 30 May 2025 14:45:00 +0000

Type Values Removed Values Added
Description Mattermost versions 10.7.x <= 10.7.0, 10.6.x <= 10.6.2, 10.5.x <= 10.5.3, 9.11.x <= 9.11.12 fails to properly invalidate personal access tokens upon user deactivation, allowing deactivated users to maintain full system access by exploiting access token validation flaws via continued usage of previously issued tokens.
Title Bypass of System Admin User Deactivation Controls for Personal Access Tokens in Mattermost Server
Weaknesses CWE-303
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Mattermost

Published: 2025-05-30T14:22:09.392Z

Updated: 2025-05-30T14:42:40.557Z

Reserved: 2025-04-03T15:46:34.595Z

Link: CVE-2025-3230

cve-icon Vulnrichment

Updated: 2025-05-30T14:42:31.645Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-05-30T15:15:41.043

Modified: 2025-05-30T16:31:03.107

Link: CVE-2025-3230

cve-icon Redhat

No data.