{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T23:50:15.715","vulnerabilities":[{"cve":{"id":"CVE-2025-46702","sourceIdentifier":"responsibledisclosure@mattermost.com","published":"2025-06-30T17:15:32.600","lastModified":"2025-07-08T14:11:52.077","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Mattermost versions 10.5.x <= 10.5.5, 9.11.x <= 9.11.15, 10.8.x <= 10.8.0, 10.7.x <= 10.7.2, 10.6.x <= 10.6.5 fail to properly enforce channel member management permissions when adding participants to playbook runs. This allows authenticated users with member-level permissions to bypass system admin restrictions and add or remove users to/from private channels via the playbook run participants feature, even when the 'Manage Members' permission has been explicitly removed. This can lead to unauthorized access to sensitive channel content and allow guest users to gain channel management privileges."},{"lang":"es","value":"Las versiones de Mattermost 10.5.x &lt;= 10.5.5, 9.11.x &lt;= 9.11.15, 10.8.x &lt;= 10.8.0, 10.7.x &lt;= 10.7.2 y 10.6.x &lt;= 10.6.5 no aplican correctamente los permisos de administración de miembros del canal al agregar participantes a las ejecuciones de playbook. Esto permite que los usuarios autenticados con permisos de miembro eludan las restricciones de administrador del sistema y agreguen o eliminen usuarios de canales privados mediante la función de participantes de la ejecución de playbook, incluso cuando se haya eliminado explícitamente el permiso \"Administrar miembros\". Esto puede provocar acceso no autorizado a contenido confidencial del canal y permitir que los usuarios invitados obtengan privilegios de administración del canal."}],"metrics":{"cvssMetricV31":[{"source":"responsibledisclosure@mattermost.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.5}]},"weaknesses":[{"source":"responsibledisclosure@mattermost.com","type":"Secondary","description":[{"lang":"en","value":"CWE-863"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*","versionStartIncluding":"9.11.0","versionEndExcluding":"9.11.16","matchCriteriaId":"9CEF0379-7E63-452C-8084-067092A25D92"},{"vulnerable":true,"criteria":"cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*","versionStartIncluding":"10.5.0","versionEndExcluding":"10.5.6","matchCriteriaId":"77EE1558-3E63-4178-90EB-DBC8F99B75AB"},{"vulnerable":true,"criteria":"cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*","versionStartIncluding":"10.6.0","versionEndExcluding":"10.6.6","matchCriteriaId":"5E1A952E-F96B-4D50-B8FD-7CAFFE73263F"},{"vulnerable":true,"criteria":"cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*","versionStartIncluding":"10.7.0","versionEndExcluding":"10.7.3","matchCriteriaId":"28D55588-A52A-4ADD-AC90-A46BED4555A1"},{"vulnerable":true,"criteria":"cpe:2.3:a:mattermost:mattermost_server:10.8.0:-:*:*:*:*:*:*","matchCriteriaId":"20DB174F-F76D-49F1-BB44-638A5FA71CDA"},{"vulnerable":true,"criteria":"cpe:2.3:a:mattermost:mattermost_server:10.8.0:rc1:*:*:*:*:*:*","matchCriteriaId":"51CA3B67-FE72-49C2-97EA-D7D86F3991EE"},{"vulnerable":true,"criteria":"cpe:2.3:a:mattermost:mattermost_server:10.8.0:rc2:*:*:*:*:*:*","matchCriteriaId":"8C4DBC6F-061B-4844-9E80-596D4890DA2A"},{"vulnerable":true,"criteria":"cpe:2.3:a:mattermost:mattermost_server:10.8.0:rc3:*:*:*:*:*:*","matchCriteriaId":"AA2C469A-7A94-4C55-9738-21C16B8C0817"}]}]}],"references":[{"url":"https://mattermost.com/security-updates","source":"responsibledisclosure@mattermost.com","tags":["Vendor Advisory"]}]}}]}