VYPR
Moderate severityNVD Advisory· Published Aug 11, 2025· Updated Aug 11, 2025

Unauthorized Channel Subscription Edit in Mattermost Confluence Plugin

CVE-2025-53910

Description

Mattermost Confluence Plugin version <1.5.0 fails to check the access of the user to the channel which allows attackers to create a channel subscription without proper access to the channel via API call to the edit channel subscription endpoint.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Mattermost Confluence Plugin <1.5.0 fails to verify channel access for API subscription edits, letting unauthorized users create subscriptions to arbitrary channels.

Vulnerability

Description CVE-2025-53910 is an authorization bypass vulnerability in the Mattermost Confluence Plugin versions prior to 1.5.0. The plugin fails to check whether the requesting user has access to a given Mattermost channel when processing API calls to the edit channel subscription endpoint. This missing access control allows an attacker to create or modify subscriptions for channels they are not a member of [1][2].

Attack

Vector & Exploitation The vulnerability can be exploited through the plugin's API endpoint used to edit channel subscriptions. An attacker with network access to the Mattermost instance, and possessing a valid API token or session, can craft a request to create a subscription that delivers Confluence notifications into a private or restricted channel. No special privileges beyond being an authenticated user are required; the plugin does not enforce channel membership verification [1][3].

Impact

Successful exploitation grants the attacker the ability to inject Confluence notifications (such as page or space updates) into arbitrary channels, potentially leaking sensitive information or disrupting user experience. This could be used for information disclosure, spam, or social engineering attempts within the organization [1][2][3].

Mitigation

Mattermost has addressed this issue in Confluence Plugin version 1.5.0. Users and administrators are strongly advised to update to the latest version to eliminate the risk. No workarounds are documented beyond the patch [1][3].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
github.com/mattermost/mattermost-plugin-confluenceGo
< 1.5.01.5.0

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.