CVE-2025-11776

4.3 MEDIUM

📋 TL;DR

Mattermost versions before 11 have an authorization bypass vulnerability where guest users can discover archived public channels through a specific API endpoint. This allows unauthorized access to channel metadata that should remain hidden. Organizations using Mattermost for team collaboration with guest users are affected.

💻 Affected Systems

Products:
  • Mattermost
Versions: All versions < 11.0.0
Operating Systems: All platforms running Mattermost
Default Config Vulnerable: ⚠️ Yes
Notes: Requires guest user functionality to be enabled and guest users to have access to the system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Guest users could map organizational structure by discovering archived channels containing sensitive project names, team compositions, or historical discussions, potentially enabling social engineering or targeted attacks.

🟠

Likely Case

Guest users inadvertently or intentionally discover archived channel names and metadata, violating intended access controls and potentially exposing organizational information that should remain private.

🟢

If Mitigated

With proper network segmentation and guest user restrictions, impact is limited to information disclosure of archived channel names only, not message content.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires guest user credentials and knowledge of the API endpoint. Simple HTTP requests can trigger the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Mattermost 11.0.0 and later

Vendor Advisory: https://mattermost.com/security-updates

Restart Required: Yes

Instructions:

1. Backup your Mattermost database and configuration. 2. Download Mattermost 11.0.0 or later from official sources. 3. Stop Mattermost service. 4. Replace existing installation with new version. 5. Restart Mattermost service. 6. Verify functionality.

🔧 Temporary Workarounds

Disable Guest Accounts

all

Temporarily disable guest user functionality to prevent exploitation

Edit config.json: set 'EnableGuestAccounts' to false
Restart Mattermost service

API Endpoint Restriction

linux

Block access to the vulnerable endpoint using web server or firewall rules

nginx: location ~* /api/v4/teams/.*/channels/search_archived { deny all; }
apache: <LocationMatch "/api/v4/teams/.*/channels/search_archived"> Require all denied </LocationMatch>

🧯 If You Can't Patch

  • Implement network segmentation to restrict guest user access to Mattermost API endpoints
  • Enable detailed logging for API access attempts and monitor for suspicious search patterns

🔍 How to Verify

Check if Vulnerable:

Check Mattermost version via System Console > About or run: mattermost version. If version is below 11.0.0, system is vulnerable.

Check Version:

mattermost version

Verify Fix Applied:

After patching, attempt to access /api/v4/teams/{team_id}/channels/search_archived as guest user - should receive 403 Forbidden.

📡 Detection & Monitoring

Log Indicators:

  • Multiple 200 OK responses to /api/v4/teams/*/channels/search_archived from guest users
  • Unusual search patterns from guest accounts

Network Indicators:

  • HTTP GET requests to search_archived endpoint from guest user IPs
  • Increased API calls to channels endpoints

SIEM Query:

source="mattermost.log" AND (uri_path="/api/v4/teams/*/channels/search_archived" AND user_role="guest")

🔗 References

📤 Share & Export