{"id":"CVE-2025-9072","details":"Mattermost versions 10.10.x \u003c= 10.10.1, 10.5.x \u003c= 10.5.9, 10.9.x \u003c= 10.9.4 fail to validate the redirect_to parameter, allowing an attacker to craft a malicious link that, once a user authenticates with their SAML provider, could post the user’s cookies to an attacker-controlled URL.","aliases":["GHSA-69j8-prx2-vx98","GO-2025-3958"],"modified":"2026-03-12T02:19:46.272624Z","published":"2025-09-15T11:15:34.183Z","related":["SUSE-SU-2025:03289-1","openSUSE-SU-2025:15564-1"],"references":[{"type":"ADVISORY","url":"https://mattermost.com/security-updates"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/mattermost/mattermost-server","events":[{"introduced":"58bd34fd34cbd7d3da777d627b6cffdf8a532930"},{"fixed":"83a37a861d3ce87bea6cd3873917adbf524f1767"},{"introduced":"14775836a78c8257de08fff229d364755346eff9"},{"fixed":"154962b1763facdc320279c12e853cb3623e9f08"},{"introduced":"c8bd5c937551a4e9ad23f5a4fd8aaf7604d046dd"},{"fixed":"70c3cb2c1eef66484d5455217295684a49b7c3f1"}],"database_specific":{"versions":[{"introduced":"10.5.0"},{"fixed":"10.5.10"},{"introduced":"10.9.0"},{"fixed":"10.9.5"},{"introduced":"10.10.0"},{"fixed":"10.10.2"}]}}],"versions":["@mattermost/client@10.5.0","@mattermost/client@10.9.0","@mattermost/types@10.5.0","@mattermost/types@10.9.0","mattermost-redux@10.9.0","v10.10.0","v10.10.1","v10.10.1-rc1","v10.10.2-rc1","v10.10.2-rc2","v10.10.2-rc3","v10.10.2-rc4","v10.5.0","v10.5.0-rc6","v10.5.1","v10.5.1-rc1","v10.5.1-rc2","v10.5.10-rc1","v10.5.10-rc2","v10.5.2","v10.5.3","v10.5.3-rc1","v10.5.4","v10.5.4-rc1","v10.5.4-rc2","v10.5.5","v10.5.5-rc1","v10.5.6","v10.5.6-rc1","v10.5.7","v10.5.8","v10.5.8-rc1","v10.5.9","v10.5.9-rc1","v10.5.9-rc2","v10.5.9-rc3","v10.5.9-rc4","v10.9.0","v10.9.0-rc4","v10.9.1","v10.9.2","v10.9.2-rc1","v10.9.3","v10.9.3-rc1","v10.9.3-rc2","v10.9.3-rc3","v10.9.3-rc4","v10.9.4","v10.9.4-rc1","v10.9.5-rc1","v10.9.5-rc2"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-9072.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"}]}