CVE-2025-4573

4.1 MEDIUM

📋 TL;DR

This vulnerability allows authenticated Mattermost administrators with specific permissions to perform LDAP search filter injection when linking LDAP groups. Attackers could potentially extract sensitive LDAP directory information or cause denial of service. Only administrators with PermissionSysconsoleWriteUserManagementGroups permission in affected Mattermost versions are impacted.

💻 Affected Systems

Products:
  • Mattermost
Versions: Mattermost versions 10.7.x <= 10.7.1, 10.6.x <= 10.6.3, 10.5.x <= 10.5.4, 9.11.x <= 9.11.13
Operating Systems: All platforms running Mattermost
Default Config Vulnerable: ⚠️ Yes
Notes: Requires LDAP integration with objectGUID configured as Group ID Attribute and administrator with PermissionSysconsoleWriteUserManagementGroups permission.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Administrator could extract sensitive LDAP directory information including user credentials, group memberships, or other organizational data, potentially leading to lateral movement or privilege escalation.

🟠

Likely Case

Information disclosure from LDAP directory, potentially exposing user attributes, group structures, or limited sensitive data depending on LDAP configuration.

🟢

If Mitigated

Minimal impact if proper access controls limit administrator permissions and LDAP directory contains minimal sensitive information.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated administrator access with specific permissions and LDAP configuration with objectGUID as Group ID Attribute.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Mattermost 10.7.2, 10.6.4, 10.5.5, 9.11.14 or later

Vendor Advisory: https://mattermost.com/security-updates

Restart Required: Yes

Instructions:

1. Backup Mattermost configuration and database. 2. Download patched version from official Mattermost repository. 3. Stop Mattermost service. 4. Install patched version. 5. Restart Mattermost service. 6. Verify version update.

🔧 Temporary Workarounds

Remove vulnerable permission

all

Temporarily remove PermissionSysconsoleWriteUserManagementGroups permission from administrators until patching

Use Mattermost System Console to modify role permissions

Change LDAP Group ID Attribute

all

Change Group ID Attribute from objectGUID to another attribute if possible

Modify LDAP configuration in Mattermost System Console

🧯 If You Can't Patch

  • Restrict administrator permissions to only essential users
  • Implement network segmentation to limit LDAP server exposure

🔍 How to Verify

Check if Vulnerable:

Check Mattermost version via System Console > About Mattermost and verify LDAP configuration uses objectGUID as Group ID Attribute

Check Version:

Check System Console > About Mattermost or run: mattermost version

Verify Fix Applied:

Verify Mattermost version is 10.7.2, 10.6.4, 10.5.5, 9.11.14 or later and test LDAP group linking functionality

📡 Detection & Monitoring

Log Indicators:

  • Unusual LDAP search patterns in Mattermost logs
  • Multiple failed LDAP group linking attempts
  • Administrator API calls to /api/v4/ldap/groups/*/link with unusual parameters

Network Indicators:

  • Unusual LDAP query patterns from Mattermost server to LDAP directory

SIEM Query:

source="mattermost" AND (uri_path="/api/v4/ldap/groups/*/link" OR message="LDAP group link")

🔗 References

📤 Share & Export