-
CVSS Score
-The vulnerability stems from unsanitized frontend redirection inputs enabling client-side path traversal. This suggests flaws in functions handling URL parameters/redirects and User Management API interactions. While exact function names/paths aren't provided in disclosures, the User Management page's frontend components and redirection utilities are logical candidates. The confidence is medium due to reliance on vulnerability patterns rather than explicit patch details.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/mattermost/mattermost/server/v8 | go | >= 9.9.0, < 9.9.2 | 9.9.2 |
| github.com/mattermost/mattermost/server/v8 | go | >= 9.5.0, < 9.5.8 | 9.5.8 |
| github.com/mattermost/mattermost/server/v8 | go | >= 9.10.0, < 9.10.1 | 9.10.1 |
| github.com/mattermost/mattermost/server/v8 | go | >= 9.8.0, < 9.8.3 | 9.8.3 |