CVE-2025-41443

4.3 MEDIUM

📋 TL;DR

This vulnerability allows guest users in Mattermost to discover active public channels and their metadata through an API endpoint, bypassing intended permission controls. It affects Mattermost instances running vulnerable versions where guest accounts are enabled. The issue stems from improper validation of guest user permissions when accessing channel information.

💻 Affected Systems

Products:
  • Mattermost
Versions: 10.5.x <= 10.5.12, 10.11.x <= 10.11.2
Operating Systems: All platforms running Mattermost
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects instances with guest accounts enabled. The vulnerability exists in the default configuration when guest access is permitted.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Guest users could map all public channels in an organization, potentially identifying sensitive team structures, project names, or organizational information that should remain hidden from guests.

🟠

Likely Case

Guest users gain visibility into public channels they shouldn't have access to, potentially learning about internal team structures or project names.

🟢

If Mitigated

Limited information disclosure with no ability to access channel content or perform actions beyond viewing metadata.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires a valid guest account. The vulnerability is straightforward to exploit once guest access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.5.13, 10.11.3, or later

Vendor Advisory: https://mattermost.com/security-updates

Restart Required: No

Instructions:

1. Upgrade Mattermost to version 10.5.13, 10.11.3, or later. 2. No restart required - the fix applies immediately after upgrade.

🔧 Temporary Workarounds

Disable Guest Accounts

all

Temporarily disable guest account functionality to prevent exploitation

Edit Mattermost configuration to set 'EnableGuestAccounts' to false

Restrict API Access

all

Block access to the vulnerable endpoint for guest users via web application firewall or reverse proxy rules

Configure WAF/reverse proxy to block POST requests to /api/v4/teams/*/channels/ids from guest user sessions

🧯 If You Can't Patch

  • Disable guest accounts entirely until patching is possible
  • Implement network segmentation to restrict guest user access to only necessary endpoints

🔍 How to Verify

Check if Vulnerable:

Check Mattermost version via System Console > About. If version is 10.5.0-10.5.12 or 10.11.0-10.11.2 with guest accounts enabled, the system is vulnerable.

Check Version:

Check System Console > About in Mattermost web interface or run: SELECT Value FROM Systems WHERE Name='Version' in Mattermost database

Verify Fix Applied:

After upgrade, verify version is 10.5.13+, 10.11.3+, or later. Test with a guest account that the /api/v4/teams/{team_id}/channels/ids endpoint properly restricts access.

📡 Detection & Monitoring

Log Indicators:

  • Multiple 200 OK responses to /api/v4/teams/*/channels/ids from guest user accounts
  • Unusual volume of channel metadata requests from guest accounts

Network Indicators:

  • Guest accounts making POST requests to channel ID enumeration endpoints
  • Pattern of guest users accessing multiple team channel endpoints

SIEM Query:

source="mattermost" AND path="/api/v4/teams/*/channels/ids" AND user_role="guest" AND response_status=200

🔗 References

📤 Share & Export