CVE-2025-1792: CWE-863: Incorrect Authorization in Mattermost Mattermost
Mattermost versions 10.7.x <= 10.7.0, 10.5.x <= 10.5.3, 9.11.x <= 9.11.12 fail to properly enforce access controls for guest users accessing channel member information, allowing authenticated guest users to view metadata about members of public channels via the channel members API endpoint.
AI Analysis
Technical Summary
CVE-2025-1792 is a security vulnerability identified in Mattermost, an open-source collaboration and messaging platform widely used for team communication. The vulnerability affects Mattermost versions 10.7.0, 10.5.0, and 9.11.0, specifically impacting the access control mechanisms for guest users. The flaw lies in the improper enforcement of authorization checks when guest users attempt to access channel member information via the channel members API endpoint. Due to this incorrect authorization (CWE-863), authenticated guest users can retrieve metadata about members of public channels, which they should not normally be permitted to view. This metadata exposure does not include sensitive personal data or credentials but may reveal user identifiers, roles, or other non-confidential information related to channel members. The vulnerability has a CVSS 3.1 base score of 3.1, indicating a low severity level. The vector details specify that the attack can be performed remotely over the network (AV:N), requires low privileges (PR:L), has high attack complexity (AC:H), does not require user interaction (UI:N), and impacts confidentiality only (C:L), without affecting integrity or availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The issue is primarily an information disclosure vulnerability due to insufficient access control validation for guest users in public channels, which could be leveraged to gather intelligence about team members or organizational structure.
Potential Impact
For European organizations using affected versions of Mattermost, this vulnerability could lead to unintended exposure of user metadata within public channels to guest users. While the information disclosed is limited and does not include sensitive personal data or credentials, it could still aid an attacker in reconnaissance activities, such as mapping organizational structures, identifying active users, or profiling communication patterns. This could be a stepping stone for more targeted social engineering or phishing attacks. The impact is more pronounced in organizations with strict data privacy requirements under regulations like GDPR, where even limited unauthorized data exposure can have compliance implications. However, since the vulnerability does not affect data integrity or availability, the operational disruption risk is minimal. The low severity score reflects the limited scope and complexity of exploitation, but organizations should still consider the risk in environments where guest access is enabled and public channels contain sensitive operational information.
Mitigation Recommendations
European organizations should promptly assess their Mattermost deployments to identify if they are running affected versions (10.7.0, 10.5.0, 9.11.0). Until official patches are released, organizations can mitigate risk by restricting guest user access to public channels or disabling guest accounts where feasible. Implementing network-level controls to limit guest user API access can also reduce exposure. Administrators should review channel membership and metadata visibility settings to ensure minimal information is exposed to guest users. Monitoring API access logs for unusual guest user activity targeting channel member endpoints can help detect exploitation attempts. Additionally, organizations should plan to upgrade Mattermost to the latest secure versions once patches become available. Incorporating strict role-based access controls and periodic audits of user permissions will further reduce the risk of similar authorization flaws.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Italy
CVE-2025-1792: CWE-863: Incorrect Authorization in Mattermost Mattermost
Description
Mattermost versions 10.7.x <= 10.7.0, 10.5.x <= 10.5.3, 9.11.x <= 9.11.12 fail to properly enforce access controls for guest users accessing channel member information, allowing authenticated guest users to view metadata about members of public channels via the channel members API endpoint.
AI-Powered Analysis
Technical Analysis
CVE-2025-1792 is a security vulnerability identified in Mattermost, an open-source collaboration and messaging platform widely used for team communication. The vulnerability affects Mattermost versions 10.7.0, 10.5.0, and 9.11.0, specifically impacting the access control mechanisms for guest users. The flaw lies in the improper enforcement of authorization checks when guest users attempt to access channel member information via the channel members API endpoint. Due to this incorrect authorization (CWE-863), authenticated guest users can retrieve metadata about members of public channels, which they should not normally be permitted to view. This metadata exposure does not include sensitive personal data or credentials but may reveal user identifiers, roles, or other non-confidential information related to channel members. The vulnerability has a CVSS 3.1 base score of 3.1, indicating a low severity level. The vector details specify that the attack can be performed remotely over the network (AV:N), requires low privileges (PR:L), has high attack complexity (AC:H), does not require user interaction (UI:N), and impacts confidentiality only (C:L), without affecting integrity or availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The issue is primarily an information disclosure vulnerability due to insufficient access control validation for guest users in public channels, which could be leveraged to gather intelligence about team members or organizational structure.
Potential Impact
For European organizations using affected versions of Mattermost, this vulnerability could lead to unintended exposure of user metadata within public channels to guest users. While the information disclosed is limited and does not include sensitive personal data or credentials, it could still aid an attacker in reconnaissance activities, such as mapping organizational structures, identifying active users, or profiling communication patterns. This could be a stepping stone for more targeted social engineering or phishing attacks. The impact is more pronounced in organizations with strict data privacy requirements under regulations like GDPR, where even limited unauthorized data exposure can have compliance implications. However, since the vulnerability does not affect data integrity or availability, the operational disruption risk is minimal. The low severity score reflects the limited scope and complexity of exploitation, but organizations should still consider the risk in environments where guest access is enabled and public channels contain sensitive operational information.
Mitigation Recommendations
European organizations should promptly assess their Mattermost deployments to identify if they are running affected versions (10.7.0, 10.5.0, 9.11.0). Until official patches are released, organizations can mitigate risk by restricting guest user access to public channels or disabling guest accounts where feasible. Implementing network-level controls to limit guest user API access can also reduce exposure. Administrators should review channel membership and metadata visibility settings to ensure minimal information is exposed to guest users. Monitoring API access logs for unusual guest user activity targeting channel member endpoints can help detect exploitation attempts. Additionally, organizations should plan to upgrade Mattermost to the latest secure versions once patches become available. Incorporating strict role-based access controls and periodic audits of user permissions will further reduce the risk of similar authorization flaws.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Mattermost
- Date Reserved
- 2025-02-28T17:40:40.314Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6839c41d182aa0cae2b43554
Added to database: 5/30/2025, 2:43:41 PM
Last enriched: 7/8/2025, 4:13:07 PM
Last updated: 8/12/2025, 2:52:29 AM
Views: 13
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.