Critical severityNVD Advisory· Published Aug 1, 2024· Updated Aug 1, 2024
Malicious remote can invite itself to an arbitrary local channel
CVE-2024-39777
Description
Mattermost versions 9.9.x <= 9.9.0, 9.5.x <= 9.5.6, 9.7.x <= 9.7.5 and 9.8.x <= 9.8.1 fail to disallow unsolicited invites to expose access to local channels, when shared channels are enabled, which allows a malicious remote to send an invite with the ID of an existing local channel, and that local channel will then become shared without the consent of the local admin.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/mattermost/mattermost/server/v8Go | >= 9.9.0, < 9.9.1 | 9.9.1 |
github.com/mattermost/mattermost/server/v8Go | >= 9.5.0, < 9.5.7 | 9.5.7 |
github.com/mattermost/mattermost/server/v8Go | >= 9.7.0, < 9.7.6 | 9.7.6 |
github.com/mattermost/mattermost/server/v8Go | >= 9.8.0, < 9.8.1 | 9.8.1 |
Affected products
1- Range: 9.9.0
Patches
355b24d27c857d45148a4586633db68643e85Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
3- github.com/advisories/GHSA-q22q-2rrf-m27pghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2024-39777ghsaADVISORY
- mattermost.com/security-updatesghsaWEB
News mentions
0No linked articles in our index yet.