CVE-2025-13324

3.7 LOW

📋 TL;DR

This vulnerability allows attackers who obtain remote cluster invite tokens to authenticate as remote clusters and perform limited actions on shared channels in Mattermost, even after legitimate invitation confirmation. It affects Mattermost servers using legacy protocol v1 or when confirming parties don't provide refreshed tokens. Organizations running affected Mattermost versions with remote cluster features enabled are vulnerable.

💻 Affected Systems

Products:
  • Mattermost
Versions: 10.11.x <= 10.11.5, 11.0.x <= 11.0.4, 10.12.x <= 10.12.2
Operating Systems: All platforms running Mattermost
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when using remote cluster features with legacy protocol v1 or when confirming parties don't provide refreshed tokens during invitation confirmation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could gain unauthorized access to shared channels, potentially accessing sensitive communications, manipulating channel content, or disrupting collaboration between federated Mattermost instances.

🟠

Likely Case

Limited unauthorized access to shared channels where the attacker can view messages, post content, or perform other channel-level actions they shouldn't have permission for.

🟢

If Mitigated

If proper network segmentation and access controls are in place, impact is limited to the specific shared channels the compromised token provides access to.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires obtaining invite tokens through other means (social engineering, credential theft, etc.) and knowledge of the remote cluster setup.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.11.6, 11.0.5, 10.12.3 or later

Vendor Advisory: https://mattermost.com/security-updates

Restart Required: Yes

Instructions:

1. Backup your Mattermost configuration and database. 2. Download the patched version from Mattermost downloads page. 3. Stop the Mattermost service. 4. Install the updated version following Mattermost upgrade documentation. 5. Restart the Mattermost service. 6. Verify the upgrade was successful.

🔧 Temporary Workarounds

Disable Remote Cluster Features

all

Temporarily disable remote cluster functionality if not required for operations

Set 'EnableRemoteClusterService' to false in config.json

Force Protocol v2

all

Configure all remote clusters to use protocol version 2

Update remote cluster configurations to use protocol version 2

🧯 If You Can't Patch

  • Disable remote cluster functionality entirely if not business-critical
  • Implement strict network segmentation to isolate Mattermost instances and monitor for unusual remote cluster authentication attempts

🔍 How to Verify

Check if Vulnerable:

Check Mattermost version via System Console > About or run 'mattermost version' command. Verify if using remote clusters with legacy protocol v1.

Check Version:

mattermost version

Verify Fix Applied:

Confirm version is 10.11.6+, 11.0.5+, or 10.12.3+ and test remote cluster functionality works properly with protocol v2.

📡 Detection & Monitoring

Log Indicators:

  • Unusual remote cluster authentication attempts
  • Multiple failed token validations
  • Remote cluster access from unexpected IPs

Network Indicators:

  • Unexpected traffic between Mattermost instances
  • Authentication attempts using old/invalidated tokens

SIEM Query:

source="mattermost" AND ("remote cluster" OR "invite token") AND ("failed" OR "unauthorized")

🔗 References

📤 Share & Export