CVE-2025-35965

6.5 MEDIUM

📋 TL;DR

This vulnerability allows attackers to create task items with excessive actions via the UpdateRunTaskActions GraphQL operation, causing server overload and denial-of-service. It affects Mattermost instances running vulnerable versions 9.11.x through 10.5.0. Both authenticated and unauthenticated users could potentially exploit this depending on configuration.

💻 Affected Systems

Products:
  • Mattermost
Versions: 9.11.x <= 9.11.10, 10.4.x <= 10.4.2, 10.5.x <= 10.5.0
Operating Systems: All platforms running Mattermost
Default Config Vulnerable: ⚠️ Yes
Notes: All Mattermost deployments with vulnerable versions are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service unavailability due to resource exhaustion, potentially affecting all users and disrupting business operations.

🟠

Likely Case

Performance degradation and intermittent service disruptions affecting user experience and productivity.

🟢

If Mitigated

Minimal impact with proper rate limiting, monitoring, and updated versions.

🌐 Internet-Facing: HIGH - Publicly accessible Mattermost instances are directly vulnerable to DoS attacks.
🏢 Internal Only: MEDIUM - Internal users could still cause disruption, though attack surface is smaller.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires knowledge of GraphQL endpoints but is technically simple. Unauthenticated access depends on Mattermost configuration.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.11.11, 10.4.3, 10.5.1 or later

Vendor Advisory: https://mattermost.com/security-updates

Restart Required: Yes

Instructions:

1. Backup your Mattermost instance. 2. Upgrade to patched version (9.11.11+, 10.4.3+, or 10.5.1+). 3. Restart Mattermost service. 4. Verify upgrade completed successfully.

🔧 Temporary Workarounds

Rate Limit GraphQL Operations

all

Implement rate limiting on GraphQL endpoints to prevent excessive requests

Configure rate limiting in Mattermost config.json or via reverse proxy

Restrict GraphQL Access

all

Limit access to GraphQL endpoints to authenticated users only

Update Mattermost configuration to require authentication for API endpoints

🧯 If You Can't Patch

  • Implement strict rate limiting on all GraphQL endpoints
  • Monitor server resource usage and set alerts for abnormal spikes

🔍 How to Verify

Check if Vulnerable:

Check Mattermost version via System Console > About or run: mattermost version

Check Version:

mattermost version

Verify Fix Applied:

Verify version is 9.11.11+, 10.4.3+, or 10.5.1+ and test UpdateRunTaskActions with excessive actions

📡 Detection & Monitoring

Log Indicators:

  • Multiple UpdateRunTaskActions operations in short time
  • High CPU/memory usage spikes
  • GraphQL query errors related to task actions

Network Indicators:

  • Unusual GraphQL request patterns
  • Multiple POST requests to /api/v4/graphql

SIEM Query:

source="mattermost" AND ("UpdateRunTaskActions" OR "graphql" AND "task") | stats count by src_ip

🔗 References

📤 Share & Export