CVE-2024-31859

Mattermost versions 9.5.x <= 9.5.3, 9.6.x <= 9.6.1 and 8.1.x <= 8.1.12 fail to perform proper authorization checks which allows a member running a playbook in an existing channel to be promoted to a channel admin
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*
cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*
cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*

History

30 Sep 2025, 15:20

Type Values Removed Values Added
References () https://mattermost.com/security-updates - () https://mattermost.com/security-updates - Vendor Advisory
CPE cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*
First Time Mattermost
Mattermost mattermost Server

21 Nov 2024, 09:14

Type Values Removed Values Added
References () https://mattermost.com/security-updates - () https://mattermost.com/security-updates -

28 May 2024, 12:39

Type Values Removed Values Added
Summary
  • (es) Las versiones 9.5.x &lt;= 9.5.3, 9.6.x &lt;= 9.6.1 y 8.1.x &lt;= 8.1.12 de Mattermost no realizan las comprobaciones de autorización adecuadas, lo que permite que un miembro que ejecuta un libro de estrategias en un canal existente sea promovido a un administrador del canal

26 May 2024, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-26 14:15

Updated : 2025-09-30 15:20


NVD link : CVE-2024-31859

Mitre link : CVE-2024-31859

CVE.ORG link : CVE-2024-31859


JSON object : View

Products Affected

mattermost

  • mattermost_server
CWE
CWE-284

Improper Access Control