CVE-2025-13821

5.7 MEDIUM

📋 TL;DR

This vulnerability allows authenticated Mattermost users to exfiltrate sensitive data including password hashes and MFA secrets through WebSocket messages. The flaw occurs when users update their profile nicknames or trigger email verification events. Organizations running affected Mattermost versions are at risk.

💻 Affected Systems

Products:
  • Mattermost
Versions: 11.1.x <= 11.1.2, 10.11.x <= 10.11.9, 11.2.x <= 11.2.1
Operating Systems: All platforms running Mattermost
Default Config Vulnerable: ⚠️ Yes
Notes: All Mattermost deployments with affected versions are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could obtain password hashes for offline cracking and MFA secrets, potentially leading to account compromise and lateral movement within the organization.

🟠

Likely Case

Malicious insiders or compromised accounts could exfiltrate sensitive user data, leading to credential theft and potential account takeover.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to authenticated users only, but still represents a significant data exposure risk.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated user access but is straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions 11.1.3, 10.11.10, 11.2.2 or later

Vendor Advisory: https://mattermost.com/security-updates

Restart Required: Yes

Instructions:

1. Backup your Mattermost instance. 2. Upgrade to patched version (11.1.3, 10.11.10, or 11.2.2+). 3. Restart Mattermost service. 4. Verify upgrade completed successfully.

🔧 Temporary Workarounds

Disable WebSocket connections

all

Temporarily disable WebSocket functionality to prevent exploitation

Set 'EnableWebSocket' to false in config.json

Restrict user permissions

all

Limit profile update permissions to administrators only

Adjust team permissions via System Console > Permissions

🧯 If You Can't Patch

  • Implement strict access controls and monitor for unusual profile update activity
  • Enable detailed logging of WebSocket connections and user profile changes

🔍 How to Verify

Check if Vulnerable:

Check Mattermost version via System Console > About Mattermost or run 'mattermost version' command

Check Version:

mattermost version

Verify Fix Applied:

Verify version is 11.1.3, 10.11.10, 11.2.2 or later and test profile nickname updates

📡 Detection & Monitoring

Log Indicators:

  • Unusual frequency of profile nickname updates
  • Multiple email verification events from single user
  • WebSocket connections with abnormal data patterns

Network Indicators:

  • Unusual WebSocket traffic patterns
  • Large outbound data transfers during profile updates

SIEM Query:

source="mattermost" AND (event="user_updated" OR event="email_verification") AND user!="system" | stats count by user

🔗 References

📤 Share & Export