Skip to content

[Snyk] Security upgrade mattermost-redux from 10.9.0 to 11.4.0#659

Merged
avasconcelos114 merged 2 commits intomasterfrom
snyk-fix-8518147a4aa10efaca7a9366715475ab
Mar 23, 2026
Merged

[Snyk] Security upgrade mattermost-redux from 10.9.0 to 11.4.0#659
avasconcelos114 merged 2 commits intomasterfrom
snyk-fix-8518147a4aa10efaca7a9366715475ab

Conversation

@mm-prodsec-bot
Copy link
Contributor

snyk-top-banner

Snyk has created this PR to fix 1 vulnerabilities in the npm dependencies of this project.

Snyk changed the following file(s):

  • webapp/package.json
  • webapp/package-lock.json

Vulnerabilities that will be fixed with an upgrade:

Issue Score
medium severity Operation on a Resource after Expiration or Release
SNYK-JS-MATTERMOSTREDUX-15702176
  465  

Important

  • Check the changes in this PR to ensure they won't cause issues with your project.
  • Max score is 1000. Note that the real score may have changed since the PR was raised.
  • This PR was automatically created by Snyk using the credentials of a real user.

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report
📜 Customise PR templates
🛠 Adjust project settings
📚 Read about Snyk's upgrade logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Learn about vulnerability in an interactive lesson of Snyk Learn.

@mm-prodsec-bot mm-prodsec-bot requested a review from a team as a code owner March 21, 2026 10:42
@coderabbitai
Copy link

coderabbitai bot commented Mar 21, 2026

Important

Review skipped

Ignore keyword(s) in the title.

Please check the settings in the CodeRabbit UI or the .coderabbit.yaml file in this repository. To trigger a single review, invoke the @coderabbitai review command.

⚙️ Run configuration

Configuration used: Repository UI

Review profile: CHILL

Plan: Pro

Run ID: d129b882-5bd4-40aa-8b1a-6e5ddea9ba02

You can disable this status message by setting the reviews.review_status to false in the CodeRabbit configuration file.

Use the checkbox below for a quick retry:

  • 🔍 Trigger review

Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out.

❤️ Share

Comment @coderabbitai help to get the list of available commands and usage tips.

@avasconcelos114
Copy link
Contributor

Actually came back to see that the CI error here is in the linter, should have a fixed version pushed to this branch in a few, looks like other libs also need to be bumped together

@dryrunsecurity
Copy link

DryRun Security

This pull request introduces code that listens for postMessage events from the parent window but does not validate the event.origin, allowing any site or iframe to send a 'SEND_POPOUT_STATE' message with an arbitrary channelId and trigger authenticated server fetches (getChannelSubscriptions), enabling hostile sites to probe or fetch data on channels the user can access. This is a high-severity cross-window messaging vulnerability and should be fixed by validating origin and restricting accepted message sources and payloads.

🟠 Cross-Window Messaging Security in webapp/src/index.ts (drs_fa331cec)
Vulnerability Cross-Window Messaging Security
Description The application listens for messages from the parent window to synchronize state. While it successfully processes messages, it fails to validate the origin of the postMessage event. This allows any malicious website or iframe that can communicate with the application to send a 'SEND_POPOUT_STATE' message. This message can contain an arbitrary channelId, which then triggers getChannelSubscriptions to perform an authenticated fetch request to the server with that channelId. While the server likely authorizes the user's access to the channel, this vulnerability allows a malicious site to perform unauthorized data fetching or discovery by probing channels the user has access to.

type: ActionTypes.SET_POPOUT_CHANNEL_ID,
channelId: state.channelId,
});
getChannelSubscriptions(state.channelId)(store.dispatch);
}
}
});


Comment to provide feedback on these findings.

Report false positive: @dryrunsecurity fp [FINDING ID] [FEEDBACK]
Report low-impact: @dryrunsecurity nit [FINDING ID] [FEEDBACK]

Example: @dryrunsecurity fp drs_90eda195 This code is not user-facing

All finding details can be found in the DryRun Security Dashboard.

@avasconcelos114
Copy link
Contributor

@DryRunSecurity fp drs_fa331cec This is a Mattermost platform API that already has origin validation built-in and proccesed in the webapp

@dryrunsecurity
Copy link

Finding fa331cec has been successfully dismissed and marked as False Positive.

@avasconcelos114 avasconcelos114 merged commit b351117 into master Mar 23, 2026
17 checks passed
@avasconcelos114 avasconcelos114 deleted the snyk-fix-8518147a4aa10efaca7a9366715475ab branch March 23, 2026 14:49
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants