Mattermost versions 10.11.x <= 10.11.5, 11.0.x <= 11.0.4, 10.12.x <= 10.12.2 fail to invalidate remote cluster invite tokens when using the legacy (version 1) protocol or when the confirming party does not provide a refreshed token, which allows an attacker who has obtained an invite token to authenticate as the remote cluster and perform limited actions on shared channels even after the invitation has been legitimately confirmed.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-x3r8-2hmh-89f5 Mattermost has an Invite Token Replay Vulnerability via Channel Membership Manipulation
Fixes

Solution

Update Mattermost to versions 11.1.0, 10.11.6, 11.0.5, 10.12.3 or higher.


Workaround

No workaround given by the vendor.

References
History

Mon, 29 Dec 2025 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Mattermost mattermost Server
CPEs cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*
Vendors & Products Mattermost mattermost Server

Wed, 24 Dec 2025 10:30:00 +0000

Type Values Removed Values Added
Description Mattermost versions 10.11.x <= 10.11.5, 11.0.x <= 11.0.4, 10.12.x <= 10.12.2 fail to invalidate invite tokens after use which allows malicious actors who have intercepted invite tokens to manipulate channel memberships including adding or removing users from private channels via token replay attack. Mattermost versions 10.11.x <= 10.11.5, 11.0.x <= 11.0.4, 10.12.x <= 10.12.2 fail to invalidate remote cluster invite tokens when using the legacy (version 1) protocol or when the confirming party does not provide a refreshed token, which allows an attacker who has obtained an invite token to authenticate as the remote cluster and perform limited actions on shared channels even after the invitation has been legitimately confirmed.
Title Mattermost Remote Cluster Invite Token Replay Lack of Invalidation of Legacy Remote Cluster Invite Tokens After Confirmation
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}

cvssV3_1

{'score': 3.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N'}


Thu, 18 Dec 2025 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Mattermost
Mattermost mattermost
Vendors & Products Mattermost
Mattermost mattermost

Wed, 17 Dec 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 17 Dec 2025 18:30:00 +0000

Type Values Removed Values Added
Description Mattermost versions 10.11.x <= 10.11.5, 11.0.x <= 11.0.4, 10.12.x <= 10.12.2 fail to invalidate invite tokens after use which allows malicious actors who have intercepted invite tokens to manipulate channel memberships including adding or removing users from private channels via token replay attack.
Title Mattermost Remote Cluster Invite Token Replay
Weaknesses CWE-863
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Mattermost

Published:

Updated: 2025-12-24T10:16:53.096Z

Reserved: 2025-11-17T17:07:12.922Z

Link: CVE-2025-13324

cve-icon Vulnrichment

Updated: 2025-12-17T18:52:27.669Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-17T19:16:01.093

Modified: 2025-12-29T18:46:13.530

Link: CVE-2025-13324

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-18T09:57:05Z

Weaknesses