Mattermost versions 10.11.x <= 10.11.8 fail to validate input size before processing hashtags which allows an authenticated attacker to exhaust CPU resources via a single HTTP request containing a post with thousands space-separated tokens
References
| Link | Resource |
|---|---|
| https://mattermost.com/security-updates | Vendor Advisory |
Configurations
History
20 Jan 2026, 15:11
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-770 | |
| CPE | cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:* | |
| References | () https://mattermost.com/security-updates - Vendor Advisory | |
| First Time |
Mattermost
Mattermost mattermost Server |
16 Jan 2026, 09:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-16 09:16
Updated : 2026-01-20 15:11
NVD link : CVE-2025-14822
Mitre link : CVE-2025-14822
CVE.ORG link : CVE-2025-14822
JSON object : View
Products Affected
mattermost
- mattermost_server
