Dependency Vulnerability Analysis¶
This document provides context on why certain third-party dependencies in Mattermost, although flagged as vulnerable by security scanners, do not pose a risk in Mattermost deployments.
This analysis is regularly updated as new vulnerability reports are received and evaluated.
Overview¶
Mattermost regularly scans its dependencies for known vulnerabilities. Some dependencies may be flagged as vulnerable by security scanners, but these vulnerabilities might not be applicable to Mattermost due to:
How the dependency is used in Mattermost
The specific version or configuration implemented
Mitigations already in place
False positives in the scanning process
Dependency Analysis Table¶
Below is a list of dependencies flagged as vulnerable by security scanners for our latest release, along with the justification for why each issue is not relevant to Mattermost deployments:
Dependency / Version |
Vulnerability |
False Positive Justification |
|---|---|---|
github.com/mattermost/ mattermost/server/v8 |
Multiple CVE IDs |
Mattermost uses Go module workspaces, which override go.mod dependency versions with local filesystem code at build time. The vulnerable versions are never included in final Docker images. |
golang.org/x/crypto v0.44.0 |
GHSA-f6x5-jh6r-wrfv CVE-2025-47914 |
Mattermost doesn’t utilize the vulnerable golang.org/x/crypto/ssh package. Upgrade is planned for v11.4 |
golang.org/x/crypto v0.44.0 |
GGHSA-j5w8-q4qc-rx2x CVE-2025-58181 |
Mattermost doesn’t utilize the vulnerable golang.org/x/crypto/ssh package. Upgrade is planned for v11.4 |