Unauthenticated Channel Subscription Edit in Mattermost Confluence Plugin
Description
Mattermost Confluence Plugin version <1.5.0 fails to enforce authentication of the user to the Mattermost instance which allows unauthenticated attackers to edit channel subscriptions via API call to the edit channel subscription endpoint.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Mattermost Confluence Plugin <1.5.0 fails to enforce authentication, allowing unauthenticated attackers to edit channel subscriptions.
The Mattermost Confluence Plugin version prior to 1.5.0 contains an authentication bypass vulnerability in the API endpoint that handles editing channel subscriptions. The plugin fails to verify that the user making the API call is authenticated to the Mattermost instance, thus allowing any unauthenticated actor to invoke the edit subscription functionality [1].
Exploitation
An attacker can exploit this flaw by sending a crafted API request directly to the edit channel subscription endpoint without needing to provide valid session credentials or authentication tokens. No prior access to the Mattermost instance or Confluence is required, making the attack surface broad and easily reachable over the network [1].
Impact
Successful exploitation enables an unauthenticated attacker to modify existing channel subscriptions within the plugin's integration. This could lead to unauthorized changes in how notifications and content are delivered between Confluence and Mattermost, potentially disrupting workflows or exposing sensitive information to unintended channels [1].
Mitigation
Users are advised to upgrade to Mattermost Confluence Plugin version 1.5.0 or later, which enforces proper authentication checks for the affected endpoint. Mattermost regularly publishes security updates and encourages responsible disclosure through their security update page [2].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/mattermost/mattermost-plugin-confluenceGo | < 1.5.0 | 1.5.0 |
Affected products
2- Range: <1.5.0
- Mattermost/Mattermost Confluence Pluginv5Range: 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-qpjq-c5hr-7925ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-54478ghsaADVISORY
- mattermost.com/security-updatesghsaWEB
News mentions
0No linked articles in our index yet.