Unauthorized Channel Subscription Creation in Mattermost Confluence Plugin
Description
Mattermost Confluence Plugin version <1.5.0 fails to check the access of the user to the channel which allows attackers to create channel subscription without proper access to the channel via API call to the create channel subscription endpoint.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Mattermost Confluence Plugin < 1.5.0 fails to check channel access, letting any attacker create subscriptions to any channel via API.
Vulnerability
Overview
The Mattermost Confluence Plugin versions prior to 1.5.0 contain an authorization bypass vulnerability in the channel subscription functionality. The plugin fails to verify whether the user making the API call has proper access to the target channel when creating a subscription via the "create channel subscription" endpoint [1][4]. This constitutes a missing authorization check at the API handler level.
Attack
Vector
An attacker can exploit this flaw by sending a crafted API request to the create channel subscription endpoint without needing any prior membership or access rights to the target channel. No authentication to the channel is required beyond general Mattermost access, and the attacker does not need to be a member of the channel they wish to subscribe [1][2]. The attack is performed remotely over the network using the Mattermost API.
Impact
A successful exploit allows an attacker to create Confluence event subscriptions to any Mattermost channel, regardless of their access permissions. This could result in unauthorized monitoring of Confluence activity (page updates, comments, space changes) being delivered into a channel the attacker cannot normally access or control. The impact is primarily a violation of channel confidentiality and integrity since the attacker may observe or manipulate which notifications a channel receives [2][3].
Mitigation
Mattermost has addressed this vulnerability by releasing version 1.5.0 of the Confluence Plugin. Users are advised to upgrade to version 1.5.0 or later. There is no known workaround for unpatched versions [1][4]. The vulnerability is tracked as GO-2025-3868 in the Go vulnerability database [3].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/mattermost/mattermost-plugin-confluenceGo | < 1.5.0 | 1.5.0 |
Affected products
2- Range: <1.5.0
- Mattermost/Mattermost Confluence Pluginv5Range: 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-qjrx-j8wm-xf83ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-8285ghsaADVISORY
- mattermost.com/security-updatesghsaWEB
- pkg.go.dev/vuln/GO-2025-3868ghsaWEB
News mentions
0No linked articles in our index yet.