CVE-2025-54499
16.10.2025, 09:15
Mattermost versions 10.5.x <= 10.5.10, 10.11.x <= 10.11.2 fail to use constant-time comparison for sensitive string comparisons which allows attackers to exploit timing oracles to perform byte-by-byte brute force attacks via response time analysis on Cloud API keys and OAuth client secretsEnginsight
Awaiting analysis
This vulnerability is currently awaiting analysis.
References