CVE-2025-54499

Source
https://cve.org/CVERecord?id=CVE-2025-54499
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-54499.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-54499
Aliases
Published
2025-10-16T09:15:34.507Z
Modified
2026-03-13T03:36:01.947655Z
Severity
  • 3.7 (Low) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
[none]
Details

Mattermost versions 10.5.x <= 10.5.10, 10.11.x <= 10.11.2 fail to use constant-time comparison for sensitive string comparisons which allows attackers to exploit timing oracles to perform byte-by-byte brute force attacks via response time analysis on Cloud API keys and OAuth client secrets

References

Affected packages

Git / github.com/mattermost/mattermost-server

Affected ranges

Type
GIT
Repo
https://github.com/mattermost/mattermost-server
Events
Database specific
{
    "versions": [
        {
            "introduced": "10.5.0"
        },
        {
            "fixed": "10.5.11"
        },
        {
            "introduced": "10.11.0"
        },
        {
            "fixed": "10.11.3"
        }
    ]
}

Affected versions

@mattermost/client@10.*
@mattermost/client@10.11.0
@mattermost/client@10.5.0
@mattermost/types@10.*
@mattermost/types@10.11.0
@mattermost/types@10.5.0
mattermost-redux@10.*
mattermost-redux@10.11.0
v10.*
v10.11.0
v10.11.0-rc3
v10.11.1
v10.11.1-rc1
v10.11.2
v10.11.2-rc1
v10.11.2-rc2
v10.5.0
v10.5.0-rc6
v10.5.1
v10.5.1-rc1
v10.5.1-rc2
v10.5.10
v10.5.10-rc1
v10.5.10-rc2
v10.5.11-rc1
v10.5.2
v10.5.3
v10.5.3-rc1
v10.5.4
v10.5.4-rc1
v10.5.4-rc2
v10.5.5
v10.5.5-rc1
v10.5.6
v10.5.6-rc1
v10.5.7
v10.5.8
v10.5.8-rc1
v10.5.9
v10.5.9-rc1
v10.5.9-rc2
v10.5.9-rc3
v10.5.9-rc4

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-54499.json"