Metrics
Affected Vendors & Products
| Link | Providers |
|---|---|
| https://mattermost.com/security-updates |
|
Wed, 24 Dec 2025 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Mattermost versions 10.11.x <= 10.11.5, 11.0.x <= 11.0.4, 10.12.x <= 10.12.2 fail to invalidate invite tokens after use which allows malicious actors who have intercepted invite tokens to manipulate channel memberships including adding or removing users from private channels via token replay attack. | Mattermost versions 10.11.x <= 10.11.5, 11.0.x <= 11.0.4, 10.12.x <= 10.12.2 fail to invalidate remote cluster invite tokens when using the legacy (version 1) protocol or when the confirming party does not provide a refreshed token, which allows an attacker who has obtained an invite token to authenticate as the remote cluster and perform limited actions on shared channels even after the invitation has been legitimately confirmed. |
| Title | Mattermost Remote Cluster Invite Token Replay | Lack of Invalidation of Legacy Remote Cluster Invite Tokens After Confirmation |
| Metrics |
cvssV3_1
|
cvssV3_1
|
Thu, 18 Dec 2025 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mattermost
Mattermost mattermost |
|
| Vendors & Products |
Mattermost
Mattermost mattermost |
Wed, 17 Dec 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 17 Dec 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Mattermost versions 10.11.x <= 10.11.5, 11.0.x <= 11.0.4, 10.12.x <= 10.12.2 fail to invalidate invite tokens after use which allows malicious actors who have intercepted invite tokens to manipulate channel memberships including adding or removing users from private channels via token replay attack. | |
| Title | Mattermost Remote Cluster Invite Token Replay | |
| Weaknesses | CWE-863 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Mattermost
Published: 2025-12-17T18:14:13.347Z
Updated: 2025-12-24T10:16:53.096Z
Reserved: 2025-11-17T17:07:12.922Z
Link: CVE-2025-13324
Updated: 2025-12-17T18:52:27.669Z
Status : Undergoing Analysis
Published: 2025-12-17T19:16:01.093
Modified: 2025-12-24T11:15:57.303
Link: CVE-2025-13324
No data.