Mattermost Confluence plugin version <1.7.0 fails to properly escape user-controlled display names in HTML template rendering which allows authenticated Confluence users with malicious display names to execute arbitrary JavaScript in victim browsers via sending a specially crafted OAuth2 connection link that, when visited, renders the attacker's display name without proper sanitization. Mattermost Advisory ID: MMSA-2025-00557
References
| Link | Resource |
|---|---|
| https://mattermost.com/security-updates | Vendor Advisory |
Configurations
History
24 Feb 2026, 21:17
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:mattermost:confluence:*:*:*:*:*:mattermost:*:* | |
| First Time |
Mattermost
Mattermost confluence |
|
| References | () https://mattermost.com/security-updates - Vendor Advisory |
06 Feb 2026, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-06 16:16
Updated : 2026-02-24 21:17
NVD link : CVE-2025-13523
Mitre link : CVE-2025-13523
CVE.ORG link : CVE-2025-13523
JSON object : View
Products Affected
mattermost
- confluence
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
