CVE-2025-53971
BaseFortify
Publication date: 2025-08-21
Last updated on: 2025-08-25
Assigner: Mattermost, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| mattermost | mattermost_server | From 9.11.0 (inc) to 9.11.18 (exc) |
| mattermost | mattermost_server | From 10.5.0 (inc) to 10.5.9 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-863 | The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in Mattermost versions 10.5.x up to 10.5.8 and 9.11.x up to 9.11.17, where the system fails to properly validate authorization when modifying team scheme roles. Specifically, it allows Team Admins to demote Team Members to Guests by using the PUT /api/v4/teams/team-id/members/user-id/schemeRoles API endpoint, which should normally be restricted.
How can this vulnerability impact me? :
The vulnerability can impact you by allowing Team Admins to reduce the privileges of Team Members to Guest status without proper authorization checks. This could lead to unauthorized restriction of user access and potential disruption of team collaboration or workflows.