Miggo Logo

CVE-2025-21088: Mattermost Incorrect Type Conversion or Cast

6.5

CVSS Score
3.1

Basic Information

EPSS Score
0.27181%
Published
1/15/2025
Updated
1/17/2025
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/mattermost/mattermost/server/v8go>= 10.2.0, < 10.2.110.2.1
github.com/mattermost/mattermost/server/v8go>= 10.1.0, <= 10.1.310.1.4
github.com/mattermost/mattermost/server/v8go>= 10.0.0, <= 10.0.310.0.4
github.com/mattermost/mattermost/server/v8go>= 9.11.0, <= 9.11.59.11.6
github.com/mattermost/mattermost/server/v8go< 8.0.0-20241127161322-25ff7a3779a58.0.0-20241127161322-25ff7a3779a5

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper type validation in post.props.attachments processing. Based on the CWE-704 description and Mattermost's architecture:

  1. PostAction unmarshalling is a prime candidate as it directly handles user-controlled input
  2. Attachment processing functions would be responsible for validating action styles
  3. The frontend crash suggests type safety failures in data serialization
  4. Confidence is medium due to lack of direct patch/diff evidence, but these are logical locations based on the described attack vector and component structure

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

M*tt*rmost v*rsions **.*.x <= **.*.*, *.**.x <= *.**.*, **.*.x <= **.*.*, **.*.x <= **.*.* **il to prop*rly v*li**t* t** styl* o* proto suppli** to *n **tion's styl* in post.props.*tt***m*nts, w*i** *llows *n *tt**k*r to *r*s* t** *ront*n* vi* *r**t*

Reasoning

T** vuln*r**ility st*ms *rom improp*r typ* v*li**tion in post.props.*tt***m*nts pro**ssin*. **s** on t** *W*-*** **s*ription *n* M*tt*rmost's *r**it**tur*: *. Post**tion unm*rs**llin* is * prim* **n*i**t* *s it *ir**tly **n*l*s us*r-*ontroll** input