VYPR
Moderate severityNVD Advisory· Published Jun 19, 2020· Updated Aug 4, 2024

CVE-2020-14457

CVE-2020-14457

Description

An issue was discovered in Mattermost Server before 5.20.0. Non-members can receive broadcasted team details via the update_team WebSocket event, aka MMSA-2020-0012.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In Mattermost Server before 5.20.0, the update_team WebSocket event incorrectly broadcasts team details to non-members, leaking sensitive information.

Vulnerability

Details

CVE-2020-14457 is an information disclosure vulnerability in Mattermost Server versions prior to 5.20.0. The root cause lies in the WebSocket event handler for update_team, which broadcasts team details to all connected users regardless of their membership status in that team [1]. This means that any authenticated user, even those who are not members of a particular team, can receive updates about that team's configuration and metadata.

Exploitation

To exploit this vulnerability, an attacker only needs to be an authenticated user on the Mattermost instance. No special privileges or network position is required beyond having a valid session. The attacker simply listens to the WebSocket events; when a team update occurs (e.g., name change, description change), the update_team event is sent to all connected clients, including non-members [3]. This is a passive information gathering technique.

Impact

The impact is the unintended disclosure of team details such as the team's display name, description, and possibly other configuration fields. While this does not directly lead to code execution or privilege escalation, it can aid an attacker in reconnaissance, allowing them to map out team structures and gather sensitive information that may be used in social engineering or further attacks.

Mitigation

The vulnerability was addressed in Mattermost Server version 5.20.0. The fix, implemented in pull request #13848, restricts the update_team event broadcast to only team members [3]. Users are strongly advised to upgrade to the latest version. Mattermost's security update page provides guidance on staying current with patches [4].

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
github.com/mattermost/mattermost-server/v5Go
< 5.20.05.20.0

Affected products

3

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.