CVE-2025-13326

3.9 LOW

📋 TL;DR

Mattermost Desktop App versions before 6.0.0 for macOS fail to enable Hardened Runtime when packaged for the Mac App Store, allowing attackers to bypass macOS security controls. This vulnerability affects macOS users running vulnerable Mattermost Desktop App versions from the Mac App Store. Attackers could potentially inherit TCC permissions by copying the binary to a temporary folder.

💻 Affected Systems

Products:
  • Mattermost Desktop App
Versions: All versions < 6.0.0
Operating Systems: macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects macOS versions when the app is installed from the Mac App Store. Direct downloads or other platforms are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could gain unauthorized access to sensitive macOS permissions (like camera, microphone, or location) that the Mattermost app had previously been granted by the user.

🟠

Likely Case

Limited privilege escalation where an attacker could access some TCC-protected resources if they already have local access and can execute the copied binary.

🟢

If Mitigated

Minimal impact if proper macOS security controls and app sandboxing are enforced, as the attack requires local access and user interaction.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local access to the system.
🏢 Internal Only: MEDIUM - Internal attackers with local access could potentially exploit this to bypass macOS security controls.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access to the system and knowledge of macOS TCC bypass techniques. The attacker needs to copy the vulnerable binary to a temporary location.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.0.0

Vendor Advisory: https://mattermost.com/security-updates

Restart Required: Yes

Instructions:

1. Open the Mac App Store. 2. Go to Updates. 3. Find Mattermost Desktop App. 4. Click Update to version 6.0.0 or higher. 5. Restart the application after update completes.

🔧 Temporary Workarounds

Use direct download version

macos

Install Mattermost Desktop App directly from Mattermost website instead of Mac App Store

Restrict app permissions

macos

Review and limit TCC permissions for Mattermost in System Settings > Privacy & Security

🧯 If You Can't Patch

  • Monitor for suspicious binary copies to /tmp or other temporary directories
  • Implement application allowlisting to prevent execution of unauthorized binaries

🔍 How to Verify

Check if Vulnerable:

Check Mattermost Desktop App version in About Mattermost. If version is below 6.0.0 and installed from Mac App Store, it is vulnerable.

Check Version:

Open Mattermost Desktop App, go to Help > About Mattermost

Verify Fix Applied:

Verify version is 6.0.0 or higher in About Mattermost. Check that Hardened Runtime is enabled using 'codesign -dv --verbose=4 /Applications/Mattermost.app'

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized copies of Mattermost binary to temporary directories
  • Unexpected TCC permission requests from Mattermost

SIEM Query:

process.name:"Mattermost" AND file.path:"/tmp/*" OR file.path:"/var/tmp/*"

🔗 References

📤 Share & Export