VYPR
Moderate severityNVD Advisory· Published Aug 11, 2025· Updated Aug 11, 2025

Unauthorized Channel Subscription Creation in Mattermost Confluence Plugin

CVE-2025-8285

Description

Mattermost Confluence Plugin version <1.5.0 fails to check the access of the user to the channel which allows attackers to create channel subscription without proper access to the channel via API call to the create channel subscription endpoint.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Mattermost Confluence Plugin < 1.5.0 fails to check channel access, letting any attacker create subscriptions to any channel via API.

Vulnerability

Overview

The Mattermost Confluence Plugin versions prior to 1.5.0 contain an authorization bypass vulnerability in the channel subscription functionality. The plugin fails to verify whether the user making the API call has proper access to the target channel when creating a subscription via the "create channel subscription" endpoint [1][4]. This constitutes a missing authorization check at the API handler level.

Attack

Vector

An attacker can exploit this flaw by sending a crafted API request to the create channel subscription endpoint without needing any prior membership or access rights to the target channel. No authentication to the channel is required beyond general Mattermost access, and the attacker does not need to be a member of the channel they wish to subscribe [1][2]. The attack is performed remotely over the network using the Mattermost API.

Impact

A successful exploit allows an attacker to create Confluence event subscriptions to any Mattermost channel, regardless of their access permissions. This could result in unauthorized monitoring of Confluence activity (page updates, comments, space changes) being delivered into a channel the attacker cannot normally access or control. The impact is primarily a violation of channel confidentiality and integrity since the attacker may observe or manipulate which notifications a channel receives [2][3].

Mitigation

Mattermost has addressed this vulnerability by releasing version 1.5.0 of the Confluence Plugin. Users are advised to upgrade to version 1.5.0 or later. There is no known workaround for unpatched versions [1][4]. The vulnerability is tracked as GO-2025-3868 in the Go vulnerability database [3].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
github.com/mattermost/mattermost-plugin-confluenceGo
< 1.5.01.5.0

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.