Mattermost

Mattermost

214 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 16.01.2026 11:25:35
  • Zuletzt bearbeitet 20.01.2026 15:06:30

Mattermost versions 10.11.x <= 10.11.8, 11.1.x <= 11.1.1, 11.0.x <= 11.0.6 fail to prevent infinite re-renders on API errors which allows authenticated users to cause application-level DoS via triggering unbounded component re-render loops.

  • EPSS 0.05%
  • Veröffentlicht 16.01.2026 08:52:43
  • Zuletzt bearbeitet 20.01.2026 15:11:19

Mattermost versions 10.11.x <= 10.11.8 fail to validate input size before processing hashtags which allows an authenticated attacker to exhaust CPU resources via a single HTTP request containing a post with thousands space-separated tokens

  • EPSS 0.03%
  • Veröffentlicht 24.12.2025 08:15:46
  • Zuletzt bearbeitet 31.12.2025 18:55:29

Mattermost versions 11.1.x <= 11.1.0, 11.0.x <= 11.0.5, 10.12.x <= 10.12.3, 10.11.x <= 10.11.7 fail to verify that post actions invoking /share-issue-publicly were created by the Jira plugin which allowed a malicious Mattermost user to exfiltrate Jir...

  • EPSS 0.03%
  • Veröffentlicht 24.12.2025 08:15:45
  • Zuletzt bearbeitet 31.12.2025 18:56:27

Mattermost versions 11.1.x <= 11.1.0, 11.0.x <= 11.0.5, 10.12.x <= 10.12.3, 10.11.x <= 10.11.7 fails to validate user channel membership when attaching Mattermost posts as comments to Jira issues, which allows an authenticated attacker with access to...

  • EPSS 0.12%
  • Veröffentlicht 22.12.2025 11:24:55
  • Zuletzt bearbeitet 29.12.2025 18:47:45

Mattermost versions 11.1.x <= 11.1.0, 11.0.x <= 11.0.5, 10.12.x <= 10.12.3, 10.11.x <= 10.11.7 with the Jira plugin enabled and Mattermost Jira plugin versions <=4.4.0 fail to enforce authentication and issue-key path restrictions in the Jira plugin,...

  • EPSS 0.02%
  • Veröffentlicht 17.12.2025 18:14:14
  • Zuletzt bearbeitet 18.12.2025 19:47:06

Mattermost Desktop App versions <6.0.0 fail to enable the Hardened Runtime on the Mattermost Desktop App when packaged for Mac App Store which allows an attacker to inherit TCC permissions via copying the binary to a tmp folder.

  • EPSS 0.04%
  • Veröffentlicht 17.12.2025 18:14:13
  • Zuletzt bearbeitet 29.12.2025 18:46:13

Mattermost versions 10.11.x <= 10.11.5, 11.0.x <= 11.0.4, 10.12.x <= 10.12.2 fail to invalidate remote cluster invite tokens when using the legacy (version 1) protocol or when the confirming party does not provide a refreshed token, which allows an a...

  • EPSS 0.02%
  • Veröffentlicht 17.12.2025 18:14:12
  • Zuletzt bearbeitet 18.12.2025 19:41:30

Mattermost Desktop App versions <6.0.0 fail to sanitize sensitive information from Mattermost logs and clear data on server deletion which allows an attacker with access to the users system to gain access to potentially sensitive information via read...

  • EPSS 0.08%
  • Veröffentlicht 17.12.2025 18:14:10
  • Zuletzt bearbeitet 29.12.2025 18:44:33

Mattermost versions 11.0.x <= 11.0.4, 10.12.x <= 10.12.2, 10.11.x <= 10.11.6 fail to check WebSocket request field for proper UTF-8 format, which allows attacker to crash Calls plug-in via sending malformed request.

  • EPSS 0.03%
  • Veröffentlicht 17.12.2025 12:19:17
  • Zuletzt bearbeitet 29.12.2025 18:55:05

Mattermost versions 10.11.x <= 10.11.4 fail to validate redirect URLs on the /error page, which allows an attacker to redirect a victim to a malicious site via a crafted link opened in a new tab.