Mattermost fails to properly validate OAuth state tokens during OpenID Connect authentication
Critical severity
GitHub Reviewed
Published
Nov 27, 2025
to the GitHub Advisory Database
•
Updated Dec 1, 2025
Package
Affected versions
>= 10.12.0, < 10.12.2
>= 10.11.0, < 10.11.5
>= 10.5.0, < 10.5.13
>= 11.0.0, < 11.0.4
Patched versions
10.12.2
10.11.5
10.5.13
11.0.4
< 8.0.0-20251028000919-d3ed703dc833
8.0.0-20251028000919-d3ed703dc833
Description
Published by the National Vulnerability Database
Nov 27, 2025
Published to the GitHub Advisory Database
Nov 27, 2025
Reviewed
Dec 1, 2025
Last updated
Dec 1, 2025
Mattermost versions 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12, 11.0.x <= 11.0.3 fail to properly validate OAuth state tokens during OpenID Connect authentication which allows an authenticated attacker with team creation privileges to take over a user account via manipulation of authentication data during the OAuth completion flow. This requires email verification to be disabled (default: disabled), OAuth/OpenID Connect to be enabled, and the attacker to control two users in the SSO system with one of them never having logged into Mattermost.
References