Lack of Authorization on Get Channel Subscriptions for Autocomplete in Mattermost Confluence Plugin
Description
Mattermost Confluence Plugin version <1.5.0 fails to check the access of the user to the channel which allows attackers to get channel subscription details without proper access to the channel via API call to the GET autocomplete/GetChannelSubscriptions endpoint.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Mattermost Confluence Plugin before v1.5.0 fails to verify channel membership, allowing unauthorized access to subscription details via the GetChannelSubscriptions API endpoint.
Vulnerability
Overview
The Mattermost Confluence Plugin, versions prior to 1.5.0, contains an authorization bypass vulnerability in the GET autocomplete/GetChannelSubscriptions API endpoint. The plugin fails to verify that the requesting user is a member of the channel for which they are querying subscription details. This missing access check allows any authenticated attacker to retrieve subscription configurations for channels they should not have access to [1].
Attack
Vector and Prerequisites
An attacker must be an authenticated user of the Mattermost instance where the Confluence plugin is installed. No special privileges are required beyond basic authentication. The attacker can then craft an API call to the affected endpoint, specifying a target channel ID or name, and the plugin will return subscription data without validating the user's membership in that channel [2]. The vulnerability lies in the missing authorization step, not in any complex exploitation technique.
Impact
Successful exploitation exposes channel subscription details, which may include: - The Confluence space or page being monitored - The specific events that trigger notifications (e.g., page created, updated, deleted) - The alias and configuration of the subscription
This information leakage can aid an attacker in reconnaissance, revealing which projects or documents are being tracked, potentially leading to further targeted attacks against Confluence content or team workflows [2].
Mitigation
The vulnerability is fixed in version 1.5.0 of the Mattermost Confluence Plugin. Users are strongly advised to update to this version or later [3]. No workarounds have been publicly documented. The plugin's GitHub repository [2] and Mattermost's Security Updates page [3] provide release notes and update guidance.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/mattermost/mattermost-plugin-confluenceGo | < 1.5.0 | 1.5.0 |
Affected products
2- Range: <1.5.0
- Mattermost/Mattermost Confluence Pluginv5Range: 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-42m6-5vm7-fjv2ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-53857ghsaADVISORY
- mattermost.com/security-updatesghsaWEB
News mentions
0No linked articles in our index yet.