Description
Mattermost versions 9.6.0, 9.5.x before 9.5.3, and 8.1.x before 8.1.12 fail to fully validate role changes, which allows an attacker authenticated as a team admin to promote guests to team admins via crafted HTTP requests.

Published: 2024-04-26
Score: 2.7 Low
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

Update Mattermost Server to versions 9.7.0, 9.6.1, 9.5.3, 8.1.12 or higher.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-1100 Mattermost versions 9.6.0, 9.5.x before 9.5.3, and 8.1.x before 8.1.12 fail to fully validate role changes, which allows an attacker authenticated as a team admin to promote guests to team admins via crafted HTTP requests.
Github GHSA Github GHSA GHSA-5fh7-7mw7-mmx5 Mattermost allows team admins to promote guests to team admins
History

Mon, 12 May 2025 14:00:00 +0000

Type Values Removed Values Added
First Time appeared Mattermost
Mattermost mattermost Server
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*
Vendors & Products Mattermost
Mattermost mattermost Server

Subscriptions

Mattermost Mattermost Server
cve-icon MITRE

Status: PUBLISHED

Assigner: Mattermost

Published:

Updated: 2024-08-01T20:33:52.915Z

Reserved: 2024-04-25T15:39:59.871Z

Link: CVE-2024-4195

cve-icon Vulnrichment

Updated: 2024-08-01T20:33:52.915Z

cve-icon NVD

Status : Analyzed

Published: 2024-04-26T09:15:12.897

Modified: 2025-05-12T13:43:36.643

Link: CVE-2024-4195

cve-icon Redhat

Severity : Low

Publid Date: 2024-04-26T00:00:00Z

Links: CVE-2024-4195 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses