CVE-2020-14457
Description
An issue was discovered in Mattermost Server before 5.20.0. Non-members can receive broadcasted team details via the update_team WebSocket event, aka MMSA-2020-0012.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In Mattermost Server before 5.20.0, the update_team WebSocket event incorrectly broadcasts team details to non-members, leaking sensitive information.
Vulnerability
Details
CVE-2020-14457 is an information disclosure vulnerability in Mattermost Server versions prior to 5.20.0. The root cause lies in the WebSocket event handler for update_team, which broadcasts team details to all connected users regardless of their membership status in that team [1]. This means that any authenticated user, even those who are not members of a particular team, can receive updates about that team's configuration and metadata.
Exploitation
To exploit this vulnerability, an attacker only needs to be an authenticated user on the Mattermost instance. No special privileges or network position is required beyond having a valid session. The attacker simply listens to the WebSocket events; when a team update occurs (e.g., name change, description change), the update_team event is sent to all connected clients, including non-members [3]. This is a passive information gathering technique.
Impact
The impact is the unintended disclosure of team details such as the team's display name, description, and possibly other configuration fields. While this does not directly lead to code execution or privilege escalation, it can aid an attacker in reconnaissance, allowing them to map out team structures and gather sensitive information that may be used in social engineering or further attacks.
Mitigation
The vulnerability was addressed in Mattermost Server version 5.20.0. The fix, implemented in pull request #13848, restricts the update_team event broadcast to only team members [3]. Users are strongly advised to upgrade to the latest version. Mattermost's security update page provides guidance on staying current with patches [4].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/mattermost/mattermost-server/v5Go | < 5.20.0 | 5.20.0 |
Affected products
3- Mattermost/Serverdescription
- osv-coords2 versions
< 5.20.0+ 1 more
- (no CPE)range: < 5.20.0
- (no CPE)range: < 5.20.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-j2h2-cvwh-cr64ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2020-14457ghsaADVISORY
- github.com/mattermost/mattermost/pull/13848ghsaWEB
- mattermost.com/security-updatesghsaWEB
- mattermost.com/security-updates/mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.