CVE-2025-13523

Mattermost Confluence plugin version <1.7.0 fails to properly escape user-controlled display names in HTML template rendering which allows authenticated Confluence users with malicious display names to execute arbitrary JavaScript in victim browsers via sending a specially crafted OAuth2 connection link that, when visited, renders the attacker's display name without proper sanitization. Mattermost Advisory ID: MMSA-2025-00557
References
Link Resource
https://mattermost.com/security-updates Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:mattermost:confluence:*:*:*:*:*:mattermost:*:*

History

24 Feb 2026, 21:17

Type Values Removed Values Added
CPE cpe:2.3:a:mattermost:confluence:*:*:*:*:*:mattermost:*:*
First Time Mattermost
Mattermost confluence
References () https://mattermost.com/security-updates - () https://mattermost.com/security-updates - Vendor Advisory

06 Feb 2026, 16:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-06 16:16

Updated : 2026-02-24 21:17


NVD link : CVE-2025-13523

Mitre link : CVE-2025-13523

CVE.ORG link : CVE-2025-13523


JSON object : View

Products Affected

mattermost

  • confluence
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')