Mattermost, Improper Access Control, CVE-2025-XXXXX (Moderate)

Listen to this Post

How the CVE Works

Mattermost fails to enforce channel member permissions during playbook runs. Authenticated users without “Manage Channel Members” privileges can manipulate playbook run participants linked to a channel, allowing unauthorized addition or removal of users from public/private channels. The vulnerability stems from inadequate permission checks when modifying playbook run participants, bypassing intended restrictions.

DailyCVE Form

Platform: Mattermost
Version: 10.5.5, 9.11.15, 10.8.0, 10.7.2, 10.6.5
Vulnerability: Improper Access Control
Severity: Moderate
Date: Jun 20, 2025

Prediction: Patch by Jul 10, 2025

What Undercode Say

Check playbook run permissions
curl -X GET /api/v4/runs/<run_id>/permissions
Exploit PoC (simulated)
curl -X POST /api/v4/runs/<run_id>/participants -d '{"user_id":"attacker"}'

How Exploit

1. Authenticate as low-privilege user.

2. Link playbook run to target channel.

3. Add/remove users via run participants API.

Protection from this CVE

  1. Upgrade to 10.5.6, 9.11.16, 10.8.1, 10.7.3, or 10.6.6.

2. Restrict playbook run API access.

3. Audit channel membership logs.

Impact

Unauthorized channel member modifications, privilege escalation, team disruption.

Sources:

Reported By: github.com
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top