Unauthorized Subscription Creation to Confluence Space in Mattermost Confluence Plugin
Description
Mattermost Confluence Plugin version <1.5.0 fails to check the access of the user to the Confluence space which allows attackers to create a subscription for a Confluence space the user does not have access to via the create subscription endpoint.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Mattermost Confluence Plugin before 1.5.0 lacks access checks, allowing unauthorized users to create subscriptions for restricted Confluence spaces.
Vulnerability
Overview
The Mattermost Confluence Plugin prior to version 1.5.0 does not verify whether the requesting user has access to the target Confluence space when creating a subscription. This missing authorization check at the plugin's create subscription endpoint allows any authenticated user to subscribe to events (such as page updates, comments, and space changes) from any Confluence space, regardless of their actual permissions in Confluence [1][2].
Exploitation
To exploit this vulnerability, an attacker must be an authenticated user in Mattermost and have the ability to invoke the plugin's subscription creation command. No special privileges within Mattermost or Confluence are required beyond basic authentication. The plugin's subscription functionality triggers on specified Confluence events (e.g., page created, updated, commented) and sends notifications to a designated Mattermost channel. By creating a subscription to a space the user cannot access, the attacker can receive information about events they otherwise would not see [2].
Impact
A successful exploit allows the attacker to monitor activity in Confluence spaces they are not authorized to view. This results in unauthorized information disclosure of Confluence events, which may include sensitive content such as new page titles, change summaries, or comment snippets. The exposed data could aid in further attacks or violate data confidentiality policies. No account takeover or code execution is involved; the impact is limited to observing space events without direct read access to the full content [1][2].
Mitigation
Users should upgrade to Mattermost Confluence Plugin version 1.5.0 or later, which includes the necessary access control checks when creating subscriptions. No workaround is available, as the fix requires code changes in the plugin. As of the publication date, the vendor has addressed this vulnerability in the patched version [1][3].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/mattermost/mattermost-plugin-confluenceGo | < 1.5.0 | 1.5.0 |
Affected products
2- Range: <1.5.0
- Mattermost/Mattermost Confluence Pluginv5Range: 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-j66h-xhpr-7q5gghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-54458ghsaADVISORY
- mattermost.com/security-updatesghsaWEB
News mentions
0No linked articles in our index yet.