Upstream information
CVE-2025-4128 at MITRE
Description
Mattermost versions 10.5.x <= 10.5.4, 9.11.x <= 9.11.13 fail to properly restrict API access to team information, allowing guest users to bypass permissions and view information about public teams they are not members of via a direct API call to /api/v4/teams/{team_id}.
Overall state of this security issue: Resolved
This issue is currently not rated by SUSE as it is not affecting the SUSE Enterprise products.
CVSS v3 Scores
| CVSS detail | CNA (Mattermost) |
| Base Score | 3.1 |
| Vector | CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N |
| Attack Vector | Network |
| Attack Complexity | High |
| Privileges Required | Low |
| User Interaction | None |
| Scope | Unchanged |
| Confidentiality Impact | Low |
| Integrity Impact | None |
| Availability Impact | None |
| CVSSv3 Version | 3.1 |
No SUSE Bugzilla entries cross referenced.
No SUSE Security Announcements cross referenced.
List of released packages
| Product(s) | Fixed package version(s) | References |
| Container suse/sl-micro/6.0/baremetal-os-container:latest | kernel-firmware-all >= 20241128-slfo.1.1_2.1
kernel-firmware-amdgpu >= 20241128-slfo.1.1_2.1
kernel-firmware-ath10k >= 20241128-slfo.1.1_2.1
kernel-firmware-ath11k >= 20241128-slfo.1.1_2.1
kernel-firmware-ath12k >= 20241128-slfo.1.1_2.1
kernel-firmware-atheros >= 20241128-slfo.1.1_2.1
kernel-firmware-bluetooth >= 20241128-slfo.1.1_2.1
kernel-firmware-bnx2 >= 20241128-slfo.1.1_2.1
kernel-firmware-brcm >= 20241128-slfo.1.1_2.1
kernel-firmware-chelsio >= 20241128-slfo.1.1_2.1
kernel-firmware-dpaa2 >= 20241128-slfo.1.1_2.1
kernel-firmware-i915 >= 20241128-slfo.1.1_2.1
kernel-firmware-intel >= 20241128-slfo.1.1_2.1
kernel-firmware-iwlwifi >= 20241128-slfo.1.1_2.1
kernel-firmware-liquidio >= 20241128-slfo.1.1_2.1
kernel-firmware-marvell >= 20241128-slfo.1.1_2.1
kernel-firmware-media >= 20241128-slfo.1.1_2.1
kernel-firmware-mediatek >= 20241128-slfo.1.1_2.1
kernel-firmware-mellanox >= 20241128-slfo.1.1_2.1
kernel-firmware-mwifiex >= 20241128-slfo.1.1_2.1
kernel-firmware-network >= 20241128-slfo.1.1_2.1
kernel-firmware-nfp >= 20241128-slfo.1.1_2.1
kernel-firmware-nvidia >= 20241128-slfo.1.1_2.1
kernel-firmware-platform >= 20241128-slfo.1.1_2.1
kernel-firmware-prestera >= 20241128-slfo.1.1_2.1
kernel-firmware-qcom >= 20241128-slfo.1.1_2.1
kernel-firmware-qlogic >= 20241128-slfo.1.1_2.1
kernel-firmware-radeon >= 20241128-slfo.1.1_2.1
kernel-firmware-realtek >= 20241128-slfo.1.1_2.1
kernel-firmware-serial >= 20241128-slfo.1.1_2.1
kernel-firmware-sound >= 20241128-slfo.1.1_2.1
kernel-firmware-ti >= 20241128-slfo.1.1_2.1
kernel-firmware-ueagle >= 20241128-slfo.1.1_2.1
kernel-firmware-usb-network >= 20241128-slfo.1.1_2.1
| |
Image SLE-Micro
Image SLE-Micro-Azure
Image SLE-Micro-BYOS
Image SLE-Micro-BYOS-Azure | python311-dnspython >= 2.4.2-2.1
| |
| SUSE Linux Enterprise Server 16.0 | govulncheck-vulndb >= 0.0.20250814T182633-160000.1.2
| Patchnames: SUSE Linux Enterprise Server 16.0 GA govulncheck-vulndb-0.0.20250814T182633-160000.1.2 |
| openSUSE Tumbleweed | govulncheck-vulndb >= 0.0.20250612T141001-1.1
| Patchnames: openSUSE-Tumbleweed-2025-15225 |
SUSE Timeline for this CVE
CVE page created: Wed Jun 11 14:00:04 2025
CVE page last modified: Wed Feb 18 20:36:52 2026