Mattermost versions 10.10.x <= 10.10.1, 10.5.x <= 10.5.9, 10.9.x <= 10.9.4 fail to validate the redirect_to parameter, allowing an attacker to craft a malicious link that, once a user authenticates with their SAML provider, could post the user’s cookies to an attacker-controlled URL.
{
"cwe_ids": [
"CWE-601"
],
"cna_assigner": "Mattermost",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/9xxx/CVE-2025-9072.json",
"unresolved_ranges": [
{
"extracted_events": [
{
"introduced": "10.10.0"
},
{
"last_affected": "10.10.1"
},
{
"introduced": "10.5.0"
},
{
"last_affected": "10.5.9"
},
{
"introduced": "10.9.0"
},
{
"last_affected": "10.9.4"
}
],
"source": "AFFECTED_FIELD"
}
]
}{
"extracted_events": [
{
"introduced": "10.5.0"
},
{
"fixed": "10.5.10"
},
{
"introduced": "10.9.0"
},
{
"fixed": "10.9.5"
},
{
"introduced": "10.10.0"
},
{
"fixed": "10.10.2"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*"
}