Miggo Logo

CVE-2025-44001: Mattermost Confluence Plugin has Missing Authorization vulnerability

4

CVSS Score
3.1

Basic Information

EPSS Score
-
Published
8/11/2025
Updated
8/11/2025
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/mattermost/mattermost-plugin-confluencego< 1.5.01.5.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

An analysis of the security vulnerability in the Mattermost Confluence Plugin reveals a missing authorization flaw. This vulnerability allows an attacker to access channel subscription details without having the necessary permissions. The flaw exists in versions prior to 1.5.0 of the plugin.

The root cause of this vulnerability lies in the handleGetChannelSubscriptions function, located in the server/subscriptions.go file. In the vulnerable versions, this function failed to verify if the user making the request was a member of the channel for which they were requesting subscription information. This oversight meant that any authenticated user could query the endpoint and retrieve subscription details for any channel, even if they were not a member of it.

The patch for this vulnerability, introduced in commit de0a3d4c9eefa013e7d9f7a18d82eeced63322e6, rectifies this issue by adding an explicit channel access check. The corrected code now retrieves the user's ID from the request context and uses the hasChannelAccess function to verify that the user is a member of the specified channel before proceeding to fetch and return the subscription details. This ensures that only authorized users can access the subscription information for a given channel.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

M*tt*rmost *on*lu*n** Plu*in v*rsions < *.*.* **il to ****k us*r ****ss to t** ***nn*l, w*i** *llows *tt**k*rs to **t ***nn*l su*s*ription **t*ils wit*out prop*r ****ss to t** ***nn*l vi* *n *PI **ll to t** **t ***nn*l Su*s*riptions **t*ils *n*point.

Reasoning

*n *n*lysis o* t** s**urity vuln*r**ility in t** M*tt*rmost *on*lu*n** Plu*in r*v**ls * missin* *ut*oriz*tion *l*w. T*is vuln*r**ility *llows *n *tt**k*r to ****ss ***nn*l su*s*ription **t*ils wit*out **vin* t** n***ss*ry p*rmissions. T** *l*w *xists