CVE-2025-12689

6.5 MEDIUM

📋 TL;DR

This vulnerability allows attackers to crash the Calls plugin in Mattermost by sending malformed WebSocket requests with improper UTF-8 formatting. Affected organizations are those running vulnerable Mattermost versions with the Calls plugin enabled.

💻 Affected Systems

Products:
  • Mattermost
Versions: 11.0.x <= 11.0.4, 10.12.x <= 10.12.2, 10.11.x <= 10.11.6
Operating Systems: All platforms running Mattermost
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with the Calls plugin enabled. The vulnerability is in the WebSocket handling code.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete denial of service for the Calls plugin functionality, disrupting voice/video communication capabilities for all users.

🟠

Likely Case

Temporary disruption of Calls plugin services requiring plugin restart or server reboot to restore functionality.

🟢

If Mitigated

No impact if the vulnerability is patched or if the Calls plugin is disabled.

🌐 Internet-Facing: HIGH if Mattermost instance is internet-facing and Calls plugin is enabled, as attackers can send malformed requests remotely.
🏢 Internal Only: MEDIUM for internal instances, as authenticated users or compromised internal systems could exploit the vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires sending malformed WebSocket requests, which is technically simple but requires understanding of the protocol and access to the WebSocket endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 11.0.5, 10.12.3, 10.11.7 or later

Vendor Advisory: https://mattermost.com/security-updates

Restart Required: Yes

Instructions:

1. Backup your Mattermost instance. 2. Upgrade to Mattermost 11.0.5, 10.12.3, or 10.11.7 or later. 3. Restart the Mattermost service. 4. Verify the Calls plugin functions correctly.

🔧 Temporary Workarounds

Disable Calls Plugin

all

Temporarily disable the Calls plugin to prevent exploitation while planning upgrade.

mmctl plugin disable com.mattermost.calls

Restrict WebSocket Access

all

Implement network controls to restrict WebSocket connections to trusted sources only.

🧯 If You Can't Patch

  • Disable the Calls plugin immediately to eliminate the attack surface
  • Implement strict network segmentation and firewall rules to limit WebSocket access to authorized users only

🔍 How to Verify

Check if Vulnerable:

Check Mattermost version via System Console > About or run: mmctl version

Check Version:

mmctl version

Verify Fix Applied:

Verify version is 11.0.5+, 10.12.3+, or 10.11.7+ and test Calls plugin functionality

📡 Detection & Monitoring

Log Indicators:

  • WebSocket connection errors
  • Calls plugin crash logs
  • Unusual malformed request patterns in access logs

Network Indicators:

  • Abnormal WebSocket traffic patterns
  • Multiple malformed WebSocket requests to Calls endpoints

SIEM Query:

source="mattermost" AND ("WebSocket error" OR "Calls plugin" AND (crash OR error))

🔗 References

📤 Share & Export