First published: Wed Apr 16 2025(Updated: )
Mattermost versions 10.4.x <= 10.4.2, 10.5.x <= 10.5.0, 9.11.x <= 9.11.9 fail to restrict domains the LLM can request to contact upstream which allows an authenticated user to exfiltrate data from an arbitrary server accessible to the victim via performing a prompt injection in the AI plugin's Jira tool.
Credit: responsibledisclosure@mattermost.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mattermost | <=10.4.2<=10.5.0<=9.11.9 | |
go/github.com/mattermost/mattermost/server/v8 | <8.0.0-20250218121836-2b5275d87136 | 8.0.0-20250218121836-2b5275d87136 |
go/github.com/mattermost/mattermost/server/v8 | >=9.11.0<9.11.10 | 9.11.10 |
go/github.com/mattermost/mattermost/server/v8 | >=10.4.0<10.4.3 | 10.4.3 |
go/github.com/mattermost/mattermost/server/v8 | >=10.5.0<10.5.1 | 10.5.1 |
Update Mattermost to versions 10.6.0, 10.4.3, 10.5.1, 9.11.10 or higher.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-31363 has been rated as a critical vulnerability due to its potential to allow data exfiltration.
To fix CVE-2025-31363, upgrade to Mattermost versions 10.5.1 or later, or 9.11.10 or later.
CVE-2025-31363 affects Mattermost versions 10.4.2, 10.5.0, and 9.11.9.
If unable to update, consider implementing stricter access controls and monitoring user activities until a patch can be applied.
CVE-2025-31363 is associated with prompt injection attacks that can lead to unauthorized data access.