First published: Wed Apr 16 2025(Updated: )
Mattermost versions 10.4.x <= 10.4.2, 10.5.x <= 10.5.0, 9.11.x <= 9.11.9 fail to restrict domains the LLM can request to contact upstream which allows an authenticated user to exfiltrate data from an arbitrary server accessible to the victim via performing a prompt injection in the AI plugin's Jira tool.
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/mattermost/mattermost/server/v8 | <8.0.0-20250218121836-2b5275d87136 | 8.0.0-20250218121836-2b5275d87136 |
go/github.com/mattermost/mattermost/server/v8 | >=9.11.0<9.11.10 | 9.11.10 |
go/github.com/mattermost/mattermost/server/v8 | >=10.4.0<10.4.3 | 10.4.3 |
go/github.com/mattermost/mattermost/server/v8 | >=10.5.0<10.5.1 | 10.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
GHSA-9h6j-4ffx-cm84 is classified as a medium severity vulnerability.
To remediate GHSA-9h6j-4ffx-cm84, update to Mattermost versions 9.11.10, 10.4.3, or 10.5.1.
Mattermost versions 10.4.x up to 10.4.2, 10.5.x up to 10.5.0, and 9.11.x up to 9.11.9 are affected by GHSA-9h6j-4ffx-cm84.
No, GHSA-9h6j-4ffx-cm84 requires an authenticated user to exploit the vulnerability.
GHSA-9h6j-4ffx-cm84 allows an authenticated user to exfiltrate data from an arbitrary server accessible via prompt injection.