VYPR
Moderate severityNVD Advisory· Published Jun 19, 2020· Updated Aug 5, 2024

CVE-2017-18902

CVE-2017-18902

Description

An issue was discovered in Mattermost Server before 4.1.0, 4.0.4, and 3.10.3. It allows attackers to discover team invite IDs via team API endpoints.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Mattermost Server before 4.1.0, 4.0.4, and 3.10.3 exposes team invite IDs via team API endpoints, allowing unauthorized team access.

The vulnerability in Mattermost Server allows attackers to discover team invite IDs through team API endpoints [1]. This is due to insufficient access control on these endpoints, which return the invite IDs that should remain secret for private teams.

The attack surface is the team API, which does not properly restrict access to invite ID information. An attacker with network access to the server can exploit this to obtain invite IDs without proper authentication [1].

Impact: An attacker can use the discovered invite IDs to join private teams without an invitation, gaining access to sensitive team communications and potentially escalating privileges within the Mattermost instance [1].

Mitigation: The issue is fixed in Mattermost versions 4.1.0, 4.0.4, and 3.10.3 [1]. Users must upgrade to a patched version to prevent exploitation.

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
github.com/mattermost/mattermost-serverGo
< 3.10.33.10.3
github.com/mattermost/mattermost-serverGo
>= 4.0.0, < 4.0.44.0.4
github.com/mattermost/mattermost-serverGo
>= 4.0.5-rc1, < 4.1.04.1.0

Affected products

4

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.