Skip to main content

CVE-2023-35075: CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') in Mattermost Mattermost

Low
VulnerabilityCVE-2023-35075cvecve-2023-35075cwe-74
Published: Mon Nov 27 2023 (11/27/2023, 09:09:19 UTC)
Source: CVE Database V5
Vendor/Project: Mattermost
Product: Mattermost

Description

Mattermost fails to use  innerText / textContent when setting the channel name in the webapp during autocomplete, allowing an attacker to inject HTML to a victim's page by create a channel name that is valid HTML. No XSS is possible though.

AI-Powered Analysis

AILast updated: 07/03/2025, 21:44:00 UTC

Technical Analysis

CVE-2023-35075 is a vulnerability identified in the Mattermost web application, specifically related to improper neutralization of special elements in output used by a downstream component, classified under CWE-74 (Improper Neutralization of Special Elements in Output). The issue arises when the Mattermost webapp sets the channel name during autocomplete functionality. Instead of using safe properties such as innerText or textContent to assign the channel name, the application directly inserts the channel name as HTML. This allows an attacker to create a channel name containing valid HTML elements, which then get injected into the victim's page DOM. Although this injection does not lead to cross-site scripting (XSS) because script execution is not possible, it still represents an injection flaw that could potentially be leveraged for UI manipulation or phishing attempts within the Mattermost interface. The vulnerability has a CVSS 3.1 base score of 3.1, indicating low severity. It requires network access (AV:N), has high attack complexity (AC:H), requires low privileges (PR:L), and no user interaction (UI:N). The impact is limited to integrity (I:L) with no confidentiality or availability impact. No known exploits are currently reported in the wild, and no patches have been linked yet. The affected versions are not explicitly detailed but presumably include recent Mattermost releases prior to the fix. The core technical issue is the failure to sanitize or properly encode channel names before rendering them in the DOM, leading to injection of HTML elements that could alter the user interface or mislead users but not execute malicious scripts.

Potential Impact

For European organizations using Mattermost as a collaboration and communication platform, this vulnerability could lead to minor integrity issues within the user interface. An attacker with the ability to create channels (which may require some level of privilege) could inject HTML elements that alter the appearance or behavior of the Mattermost client for other users. Although no direct code execution or data theft is possible, this could be exploited for social engineering or phishing attacks within the platform, potentially tricking users into revealing sensitive information or performing unintended actions. The low severity and lack of known exploits reduce the immediate risk, but organizations with high reliance on Mattermost for internal communications should consider the reputational and operational risks of UI manipulation. The impact is more pronounced in environments where channel creation is less restricted or where users may be less security-aware. Since Mattermost is often used in enterprise and government sectors, any manipulation of the interface could undermine trust in the platform and complicate incident response.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Apply any official patches or updates from Mattermost as soon as they become available to ensure the issue is resolved at the source. 2) Implement strict access controls on who can create or rename channels within Mattermost to limit the ability of attackers to inject malicious HTML. 3) Monitor channel names for suspicious or unusual HTML content and enforce validation or sanitization policies at the application or proxy level if possible. 4) Educate users about the potential for UI manipulation and encourage vigilance against unexpected interface changes or phishing attempts within Mattermost. 5) Consider deploying Content Security Policy (CSP) headers to restrict the execution of inline scripts or loading of untrusted content, even though this vulnerability does not enable script execution directly. 6) Regularly audit Mattermost configurations and logs to detect any attempts to exploit this injection flaw. These steps go beyond generic advice by focusing on access control, monitoring, and user awareness tailored to the specific injection vector in Mattermost channel names.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Mattermost
Date Reserved
2023-11-20T12:06:31.656Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683f034b182aa0cae27e66ee

Added to database: 6/3/2025, 2:14:35 PM

Last enriched: 7/3/2025, 9:44:00 PM

Last updated: 7/28/2025, 12:10:55 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats