CVE Vulnerabilities

CVE-2025-3230

Incorrect Implementation of Authentication Algorithm

Published: May 30, 2025 | Modified: Oct 15, 2025
CVSS 3.x
5.4
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

Mattermost versions 10.7.x <= 10.7.0, 10.6.x <= 10.6.2, 10.5.x <= 10.5.3, 9.11.x <= 9.11.12 fails to properly invalidate personal access tokens upon user deactivation, allowing deactivated users to maintain full system access by exploiting access token validation flaws via continued usage of previously issued tokens.

Weakness

The requirements for the product dictate the use of an established authentication algorithm, but the implementation of the algorithm is incorrect.

Affected Software

NameVendorStart VersionEnd Version
Mattermost_serverMattermost9.11.0 (including)9.11.13 (excluding)
Mattermost_serverMattermost10.5.0 (including)10.5.4 (excluding)
Mattermost_serverMattermost10.6.0 (including)10.6.3 (excluding)
Mattermost_serverMattermost10.7.0 (including)10.7.1 (excluding)

References