Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13523: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Mattermost Mattermost Confluence Plugin

0
High
VulnerabilityCVE-2025-13523cvecve-2025-13523cwe-79
Published: Fri Feb 06 2026 (02/06/2026, 15:52:31 UTC)
Source: CVE Database V5
Vendor/Project: Mattermost
Product: Mattermost Confluence Plugin

Description

CVE-2025-13523 is a high-severity cross-site scripting (XSS) vulnerability in the Mattermost Confluence plugin versions prior to 1. 7. 0. It arises from improper sanitization of user-controlled display names during HTML template rendering. Authenticated Confluence users with malicious display names can craft OAuth2 connection links that execute arbitrary JavaScript in the browsers of other users who visit these links. Exploitation requires authentication and user interaction, but can lead to full compromise of confidentiality and integrity of user sessions. No known exploits are currently reported in the wild. The vulnerability has a CVSS score of 7. 7, reflecting its significant impact and moderate complexity to exploit. European organizations using Mattermost integrated with Confluence should prioritize patching or mitigating this issue to prevent potential session hijacking or data theft.

AI-Powered Analysis

AILast updated: 02/06/2026, 16:59:30 UTC

Technical Analysis

CVE-2025-13523 is a cross-site scripting (XSS) vulnerability classified under CWE-79, affecting the Mattermost Confluence plugin versions earlier than 1.7.0. The root cause is the failure to properly escape or sanitize user-controlled display names when rendering HTML templates. Specifically, authenticated users in Confluence can set malicious display names containing JavaScript payloads. When these users send specially crafted OAuth2 connection links embedding their display names, other users who click these links will have the attacker's script executed in their browsers. This vulnerability requires the attacker to be authenticated in Confluence and relies on user interaction (clicking the malicious link). The impact is severe because the XSS is stored and reflected in a context that allows execution of arbitrary JavaScript, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the victim. The CVSS v3.1 score of 7.7 indicates a high severity, with network attack vector, high privileges required (authenticated user), user interaction needed, and a scope change that affects confidentiality and integrity but not availability. No public exploits have been reported yet, but the vulnerability is publicly disclosed and documented by Mattermost (MMSA-2025-00557). The plugin is commonly used in environments where Mattermost is integrated with Atlassian Confluence, often in enterprise collaboration settings.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of internal communications and user sessions within Mattermost and Confluence integrations. Attackers with authenticated access can leverage this flaw to execute malicious scripts in the browsers of other users, potentially stealing session cookies, credentials, or performing unauthorized actions. This can lead to data breaches, lateral movement within corporate networks, and compromise of sensitive project information. Given the widespread use of Atlassian Confluence and Mattermost in European enterprises, especially in sectors like finance, manufacturing, and government, the impact could be substantial. The vulnerability could also undermine trust in collaboration platforms and lead to regulatory compliance issues under GDPR if personal data is exposed or manipulated. The requirement for authentication and user interaction somewhat limits the attack surface but does not eliminate the risk, especially in environments with many internal users and frequent link sharing.

Mitigation Recommendations

1. Immediately restrict or monitor the sharing of OAuth2 connection links within the organization to prevent malicious link propagation. 2. Implement strict input validation and sanitization on user display names at the application level, if possible, as a temporary control. 3. Educate users to be cautious about clicking on unexpected or suspicious OAuth2 links, especially those received from internal users. 4. Apply network-level protections such as Content Security Policy (CSP) headers to limit the impact of injected scripts. 5. Monitor logs and user activity for unusual behavior indicative of exploitation attempts, such as unexpected OAuth2 link visits or changes in display names. 6. Coordinate with Mattermost and Atlassian to obtain and deploy the official patch for the Confluence plugin version 1.7.0 or later as soon as it becomes available. 7. Review and tighten Confluence user permissions to limit the ability to set or change display names arbitrarily. 8. Consider isolating or sandboxing the plugin environment to reduce the scope of potential XSS impact.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Mattermost
Date Reserved
2025-11-21T19:29:16.051Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69861a9bf9fa50a62f1c90a2

Added to database: 2/6/2026, 4:45:15 PM

Last enriched: 2/6/2026, 4:59:30 PM

Last updated: 2/6/2026, 5:57:16 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats