GHSA-hm95-jx66-g2gh

Suggest an improvement
Source
https://github.com/advisories/GHSA-hm95-jx66-g2gh
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/09/GHSA-hm95-jx66-g2gh/GHSA-hm95-jx66-g2gh.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-hm95-jx66-g2gh
Aliases
Published
2025-09-15T12:31:25Z
Modified
2025-09-17T17:42:24.520016Z
Severity
  • 3.1 (Low) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N CVSS Calculator
Summary
Mattermost Open Redirect vulnerability
Details

Mattermost versions 10.5.x <= 10.5.9 fail to properly validate redirect URLs which allows attackers to redirect users to malicious sites via crafted OAuth login URLs.

Database specific
{
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-601"
    ],
    "severity": "LOW",
    "github_reviewed_at": "2025-09-16T20:00:25Z",
    "nvd_published_at": "2025-09-15T11:15:34Z"
}
References

Affected packages

Go / github.com/mattermost/mattermost/server/v8

Package

Name
github.com/mattermost/mattermost/server/v8
View open source insights on deps.dev
Purl
pkg:golang/github.com/mattermost/mattermost/server/v8

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
8.0.0-202508080704-39bd251fe4f600

Go / github.com/mattermost/mattermost-server

Package

Name
github.com/mattermost/mattermost-server
View open source insights on deps.dev
Purl
pkg:golang/github.com/mattermost/mattermost-server

Affected ranges

Type
SEMVER
Events
Introduced
10.5.0
Fixed
10.5.10