fkie_cve-2025-46702
Vulnerability from fkie_nvd
Published
2025-06-30 17:15
Modified
2025-07-08 14:11
Severity ?
Summary
Mattermost versions 10.5.x <= 10.5.5, 9.11.x <= 9.11.15, 10.8.x <= 10.8.0, 10.7.x <= 10.7.2, 10.6.x <= 10.6.5 fail to properly enforce channel member management permissions when adding participants to playbook runs. This allows authenticated users with member-level permissions to bypass system admin restrictions and add or remove users to/from private channels via the playbook run participants feature, even when the 'Manage Members' permission has been explicitly removed. This can lead to unauthorized access to sensitive channel content and allow guest users to gain channel management privileges.
References
▶ | URL | Tags | |
---|---|---|---|
responsibledisclosure@mattermost.com | https://mattermost.com/security-updates | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mattermost | mattermost_server | * | |
mattermost | mattermost_server | * | |
mattermost | mattermost_server | * | |
mattermost | mattermost_server | * | |
mattermost | mattermost_server | 10.8.0 | |
mattermost | mattermost_server | 10.8.0 | |
mattermost | mattermost_server | 10.8.0 | |
mattermost | mattermost_server | 10.8.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "9CEF0379-7E63-452C-8084-067092A25D92", "versionEndExcluding": "9.11.16", "versionStartIncluding": "9.11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "77EE1558-3E63-4178-90EB-DBC8F99B75AB", "versionEndExcluding": "10.5.6", "versionStartIncluding": "10.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "5E1A952E-F96B-4D50-B8FD-7CAFFE73263F", "versionEndExcluding": "10.6.6", "versionStartIncluding": "10.6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "28D55588-A52A-4ADD-AC90-A46BED4555A1", "versionEndExcluding": "10.7.3", "versionStartIncluding": "10.7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mattermost:mattermost_server:10.8.0:-:*:*:*:*:*:*", "matchCriteriaId": "20DB174F-F76D-49F1-BB44-638A5FA71CDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mattermost:mattermost_server:10.8.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "51CA3B67-FE72-49C2-97EA-D7D86F3991EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:mattermost:mattermost_server:10.8.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "8C4DBC6F-061B-4844-9E80-596D4890DA2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mattermost:mattermost_server:10.8.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "AA2C469A-7A94-4C55-9738-21C16B8C0817", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Mattermost versions 10.5.x \u003c= 10.5.5, 9.11.x \u003c= 9.11.15, 10.8.x \u003c= 10.8.0, 10.7.x \u003c= 10.7.2, 10.6.x \u003c= 10.6.5 fail to properly enforce channel member management permissions when adding participants to playbook runs. This allows authenticated users with member-level permissions to bypass system admin restrictions and add or remove users to/from private channels via the playbook run participants feature, even when the \u0027Manage Members\u0027 permission has been explicitly removed. This can lead to unauthorized access to sensitive channel content and allow guest users to gain channel management privileges." }, { "lang": "es", "value": "Las versiones de Mattermost 10.5.x \u0026lt;= 10.5.5, 9.11.x \u0026lt;= 9.11.15, 10.8.x \u0026lt;= 10.8.0, 10.7.x \u0026lt;= 10.7.2 y 10.6.x \u0026lt;= 10.6.5 no aplican correctamente los permisos de administraci\u00f3n de miembros del canal al agregar participantes a las ejecuciones de playbook. Esto permite que los usuarios autenticados con permisos de miembro eludan las restricciones de administrador del sistema y agreguen o eliminen usuarios de canales privados mediante la funci\u00f3n de participantes de la ejecuci\u00f3n de playbook, incluso cuando se haya eliminado expl\u00edcitamente el permiso \"Administrar miembros\". Esto puede provocar acceso no autorizado a contenido confidencial del canal y permitir que los usuarios invitados obtengan privilegios de administraci\u00f3n del canal." } ], "id": "CVE-2025-46702", "lastModified": "2025-07-08T14:11:52.077", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.5, "source": "responsibledisclosure@mattermost.com", "type": "Secondary" } ] }, "published": "2025-06-30T17:15:32.600", "references": [ { "source": "responsibledisclosure@mattermost.com", "tags": [ "Vendor Advisory" ], "url": "https://mattermost.com/security-updates" } ], "sourceIdentifier": "responsibledisclosure@mattermost.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-863" } ], "source": "responsibledisclosure@mattermost.com", "type": "Secondary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…