CVE-2025-47870

4.3 MEDIUM

📋 TL;DR

This vulnerability allows team administrators without member invite privileges to obtain a team's invite ID through the team restore API endpoint. Affected systems include Mattermost versions 10.8.x up to 10.8.3, 10.5.x up to 10.5.8, 9.11.x up to 9.11.17, and 10.9.x up to 10.9.2.

💻 Affected Systems

Products:
  • Mattermost
Versions: 10.8.x <= 10.8.3, 10.5.x <= 10.5.8, 9.11.x <= 9.11.17, 10.9.x <= 10.9.2
Operating Systems: All platforms running Mattermost
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected versions are vulnerable. The vulnerability exists in the team restore API endpoint.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with team admin access could obtain invite IDs and potentially share them to add unauthorized users to teams, leading to data exposure or privilege escalation.

🟠

Likely Case

Team admins accidentally or intentionally obtaining invite IDs they shouldn't have access to, potentially enabling unauthorized team membership.

🟢

If Mitigated

Minimal impact with proper access controls and monitoring, as the vulnerability requires authenticated team admin access.

🌐 Internet-Facing: MEDIUM - If the Mattermost instance is internet-facing, the attack surface increases, but exploitation still requires authenticated team admin access.
🏢 Internal Only: MEDIUM - Internal attackers with team admin privileges could exploit this to gain unauthorized access to team invite IDs.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated team admin access and knowledge of the vulnerable API endpoint. No public exploit code is known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 10.8.3, 10.5.8, 9.11.17, and 10.9.2

Vendor Advisory: https://mattermost.com/security-updates

Restart Required: No

Instructions:

1. Upgrade Mattermost to the latest patched version. 2. For version 10.8.x, upgrade to 10.8.4 or later. 3. For version 10.5.x, upgrade to 10.5.9 or later. 4. For version 9.11.x, upgrade to 9.11.18 or later. 5. For version 10.9.x, upgrade to 10.9.3 or later.

🔧 Temporary Workarounds

Restrict API Access

all

Implement network-level restrictions to limit access to the vulnerable API endpoint (/api/v4/teams/:teamId/restore) to only authorized administrators.

Monitor Team Restore Activity

all

Enable detailed logging for team restore operations and monitor for unusual patterns or unauthorized access attempts.

🧯 If You Can't Patch

  • Review and restrict team admin privileges to minimize the number of users who could potentially exploit this vulnerability.
  • Implement additional monitoring and alerting for team restore API calls to detect potential exploitation attempts.

🔍 How to Verify

Check if Vulnerable:

Check your Mattermost version against the affected version ranges. If running 10.8.x <= 10.8.3, 10.5.x <= 10.5.8, 9.11.x <= 9.11.17, or 10.9.x <= 10.9.2, you are vulnerable.

Check Version:

Check Mattermost System Console > About Mattermost, or run: mattermost version (if using CLI)

Verify Fix Applied:

After upgrading, verify your Mattermost version is above the vulnerable ranges: >10.8.3, >10.5.8, >9.11.17, or >10.9.2.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /api/v4/teams/*/restore endpoint from team admins
  • Multiple team restore attempts in short timeframes
  • Team restore operations from unexpected IP addresses or users

Network Indicators:

  • POST requests to /api/v4/teams/:teamId/restore endpoint with unusual patterns
  • Increased API traffic to team management endpoints

SIEM Query:

source="mattermost" AND (uri_path="/api/v4/teams/*/restore" OR endpoint="team_restore") AND http_method="POST"

🔗 References

📤 Share & Export