First published: Fri Mar 21 2025(Updated: )
Mattermost versions 10.4.x <= 10.4.2, 10.3.x <= 10.3.3, 9.11.x <= 9.11.8 fail to fail to enforce channel conversion restrictions, which allows members with permission to convert public channels to private ones to also convert private ones to public
Credit: responsibledisclosure@mattermost.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mattermost | <=10.4.2<=10.3.3<=9.11.8 | |
go/github.com/mattermost/mattermost/server/v8 | <8.0.0-20250218135018-e644e3c8e393 | 8.0.0-20250218135018-e644e3c8e393 |
go/github.com/mattermost/mattermost-server | <9.11.9 | 9.11.9 |
go/github.com/mattermost/mattermost/server/v8 | >=9.11.0<9.11.9 | 9.11.9 |
go/github.com/mattermost/mattermost/server/v8 | >=10.3.0<10.3.4 | 10.3.4 |
go/github.com/mattermost/mattermost/server/v8 | >=10.4.0<10.4.3 | 10.4.3 |
Mattermost | >=9.11.0<9.11.9 | |
Mattermost | >=10.3.0<10.3.4 | |
Mattermost | >=10.4.0<10.4.3 |
Update Mattermost to versions 10.5.0, 10.4.3, 10.3.4, 9.11.9 or higher.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-27933 has a medium severity level as it allows improper channel conversion leading to potential data exposure.
To resolve CVE-2025-27933, upgrade Mattermost to version 10.4.3 or higher, 10.3.4 or higher, or 9.11.9 or higher.
CVE-2025-27933 affects Mattermost versions 10.4.x up to 10.4.2, 10.3.x up to 10.3.3, and 9.11.x up to 9.11.8.
CVE-2025-27933 can be exploited by users with permissions to convert public channels to private channels, allowing inappropriate conversions.
There is currently no public information suggesting that CVE-2025-27933 is under active exploitation.