Mattermost, Incorrect Authentication Algorithm, CVE-2025-XXXX (Moderate)

How the CVE Works:

Mattermost fails to clear cached authentication tokens when a user account is converted into a bot. This oversight allows an attacker to log in using the original user credentials once before the cache refreshes. The vulnerability stems from improper session invalidation during account type transitions, permitting unauthorized access despite role changes.

DailyCVE Form:

Platform: Mattermost
Version: 10.5.0-10.5.1, 9.11.0-9.11.9
Vulnerability: Auth bypass
Severity: Moderate
Date: 2025-04-14

What Undercode Say:

Exploitation:

1. Identify a user converted to a bot.

2. Use original credentials before cache updates.

3. Gain one-time bot access.

Mitigation:

1. Upgrade to patched versions (10.5.2, 9.11.10).

2. Force cache reset post-account conversion.

Detection Command:

curl -s http://mattermost-server/api/v4/users | grep "bot"

Patch Verification:

docker exec mattermost grep "10.5.2" /opt/mattermost/version.txt

Temporary Workaround:

Manually invalidate cache via API
import requests
headers = {"Authorization": "Bearer YOUR_ADMIN_TOKEN"}
requests.post("https://mattermost.example.com/api/v4/caches/invalidate", headers=headers)

Log Monitoring:

tail -f /var/log/mattermost/security.log | grep "invalid login"

Impact Analysis:

  • One-time auth bypass.
  • Limited to bot accounts.
  • Low persistence risk.

References:

References:

Reported By: https://github.com/advisories/GHSA-6rqh-8465-2xcw
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top