Low severityNVD Advisory· Published Apr 16, 2025· Updated Apr 16, 2025
Data exfiltration via AI plugin Jira tool
CVE-2025-31363
Description
Mattermost versions 10.4.x <= 10.4.2, 10.5.x <= 10.5.0, 9.11.x <= 9.11.9 fail to restrict domains the LLM can request to contact upstream which allows an authenticated user to exfiltrate data from an arbitrary server accessible to the victim via performing a prompt injection in the AI plugin's Jira tool.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/mattermost/mattermost/server/v8Go | >= 10.5.0, < 10.5.1 | 10.5.1 |
github.com/mattermost/mattermost/server/v8Go | >= 10.4.0, < 10.4.3 | 10.4.3 |
github.com/mattermost/mattermost/server/v8Go | >= 9.11.0, < 9.11.10 | 9.11.10 |
github.com/mattermost/mattermost/server/v8Go | < 8.0.0-20250218121836-2b5275d87136 | 8.0.0-20250218121836-2b5275d87136 |
Affected products
1- Range: 10.4.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-9h6j-4ffx-cm84ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-31363ghsaADVISORY
- mattermost.com/security-updatesghsaWEB
- pkg.go.dev/vuln/GO-2025-3622ghsaWEB
News mentions
0No linked articles in our index yet.