github.com/mattermost/mattermost-server known bugs

go

384 known bugs in github.com/mattermost/mattermost-server, with affected versions, fixes and workarounds. Sourced from upstream issue trackers.

384
bugs
Known bugs
SeverityAffectedFixed inTitleStatusSource
highany4.1.2
Mattermost Server does not properly restrict use of slash commands
An issue was discovered in Mattermost Server before 4.3.0, 4.2.1, and 4.1.2. It allows a bypass of restrictions on use of slash commands.
fixedosv:GHSA-wvjg-33p9-938h
highany3.1.1
Mattermost Server: initial_load API exposes unnecessary information
An issue was discovered in Mattermost Server before 3.1.1. The initial_load API disclosed unnecessary personal information.
fixedosv:GHSA-r93j-3mmp-px57
highany8.0.0-20250815100400-2d5cdc6e217e
Mattermost has a Missing Authorization vulnerability
Mattermost versions 10.11.x <= 10.11.1, 10.10.x <= 10.10.2, 10.5.x <= 10.5.10 fail to verify a user has permission to join a Mattermost team using the original invite token which allows any attacked to join any team on a Mattermost server regardless of restrictions via manipulating the RelayState.
fixedosv:GHSA-r6qj-894f-5hr2
highany3.8.1-0.20170504181128-4f074fed0d65
Mattermost Server SAML implementation does not require encryption or signature verification as default
An issue was discovered in Mattermost Server before 3.9.0 when SAML is used. Encryption and signature verification are not mandatory.
fixedosv:GHSA-r6j5-fqx9-7qv9
high10.8.010.8.4
Mattermost Path Traversal vulnerability
Mattermost versions 10.8.x <= 10.8.3, 10.5.x <= 10.5.8, 9.11.x <= 9.11.17, 10.10.x <= 10.10.1, 10.9.x <= 10.9.3 fail to validate import directory path configuration which allows admin users to execute arbitrary code via malicious plugin upload to prepackaged plugins directory
fixedosv:GHSA-qx3f-6vq3-8j8m
highany3.2.0
Mattermost Server does not enforce rate limits on password change attempts
An issue was discovered in Mattermost Server before 3.2.0. It mishandles brute-force attempts at password change.
fixedosv:GHSA-qrf6-h5fc-7m96
highany8.0.0-20260129164748-7201f42d955f
Mattermost fails to properly handle very long passwords
Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2, 10.11.x <= 10.11.10 fail to properly handle very long passwords, which allows an attacker to overload the server CPU and memory via executing login attempts with multi-megabyte passwords. Mattermost Advisory ID: MMSA-2026-00587
fixedosv:GHSA-m5rv-56xx-hfc6
highany3.7.4-0.20170404171331-0b5c0794fdcb
Mattermost Server allows an attacker to specify a full pathname of a log file
An issue was discovered in Mattermost Server before 3.7.5. It allows an attacker to specify a full pathname of a log file.
fixedosv:GHSA-m2ch-x2q7-2284
highany3.7.5-0.20170421192444-247cd1e51a8c
Mattermost Server uses weak hashing for OAuth, email verification tokens and invitations
An issue was discovered in Mattermost Server before 3.8.2 and 3.7.5. Weak hashing was used for e-mail invitations, OAuth, and e-mail verification tokens.
fixedosv:GHSA-jxc4-w54c-qv5r
highany4.2.2
Mattermost Server vulnerable to Denial of Service through `@` character prefix inserted into JavaScript field names
An issue was discovered in Mattermost Server before 4.5.0, 4.4.5, 4.3.4, and 4.2.2. It allows attackers to cause a denial of service (application crash) via an @ character before a JavaScript field name.
fixedosv:GHSA-jc6w-8r7f-vmp5
highany3.0.0
Mattermost Server: Insufficient Password-Reset Link Invalidation
An issue was discovered in Mattermost Server before 3.0.0. A password-reset link could be reused.
fixedosv:GHSA-j26g-95ph-2mwv
highany4.0.5
Mattermost Server has intermittent Authorization bypass for resource-owners
An issue was discovered in Mattermost Server before 4.2.0, 4.1.1, and 4.0.5, when used as an OAuth 2.0 service provider. Resource-owner authorization can be intermittently bypassed, allowing account takeover.
fixedosv:GHSA-gg42-mwr6-p82c
highany3.9.2-0.20170714134023-b17fca0d5ee7
Mattermost Server vulnerable to user account takeover when Single Sign-On OAuth2 is used
An issue was discovered in Mattermost Server before 4.0.0, 3.10.2, and 3.9.2, when Single Sign-On OAuth2 is used. An attacker could claim somebody else's account.
fixedosv:GHSA-fpcr-4rr5-hpcp
highany3.9.2
Mattermost Server vulnerable to CSRF if CORS is enabled
An issue was discovered in Mattermost Server before 4.0.0, 3.10.2, and 3.9.2. CSRF can occur if CORS is enabled.
fixedosv:GHSA-fcwg-45jh-5qhf
highany8.0.0-20250807174701-e14175eb6539
Mattermost has a Missing Authorization vulnerability
Mattermost versions 10.11.x <= 10.11.1, 10.10.x <= 10.10.2, 10.5.x <= 10.5.10 fail to verify a user has permission to join a Mattermost team using the original invite token which allows any attacked to join any team on a Mattermost server regardless of restrictions via manipulating the OAuth state.
fixedosv:GHSA-6q7m-p8cc-998r
high10.10.010.10.2
Mattermost Open Redirect vulnerability
Mattermost versions 10.10.x <= 10.10.1, 10.5.x <= 10.5.9, 10.9.x <= 10.9.4 fail to validate the redirect_to parameter, allowing an attacker to craft a malicious link that, once a user authenticates with their SAML provider, could post the user’s cookies to an attacker-controlled URL.
fixedosv:GHSA-69j8-prx2-vx98
highany5.1.0
Mattermost Server is vulnerable to a Denial of Service attack through `invite_people` command
An issue was discovered in Mattermost Server before 5.1.0. It allows attackers to cause a denial of service via the invite_people slash command.
fixedosv:GHSA-5mh6-p63g-3mv5
highany3.0.0
Mattermost Server does not check if cookies are used over SSL
An issue was discovered in Mattermost Server before 3.0.0. It does not ensure that a cookie is used over SSL.
fixedosv:GHSA-379p-37xc-q963
medium11.4.0-rc1+incompatible11.4.1+incompatible
Mattermost doesn't rate limit login requests, allowing DoS in github.com/mattermost/mattermost-server
Mattermost doesn't rate limit login requests, allowing DoS in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost-server from v8.0.0-20260105080200-d27a2195068d before v8.0.0-20260217110922-b7d4a1f1f59b.
fixedosv:GO-2026-4916
medium11.3.0-rc1+incompatible11.3.1+incompatible
Mattermost fails to validate user's authentication method when processing account auth type switch in github.com/mattermost/mattermost-server
Mattermost fails to validate user's authentication method when processing account auth type switch in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost-server/v5 before v5.3.2-0.20260127144908-ced9a56e3988.
fixedosv:GO-2026-4786
medium11.3.0-rc1+incompatible11.3.1+incompatible
Mattermost fails to validate team-specific upload_file permissions in github.com/mattermost/mattermost-server
Mattermost fails to validate team-specific upload_file permissions in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost-server/v5 before v5.3.2-0.20260107144005-c7f6efdfb035.
fixedosv:GO-2026-4749
medium11.3.0-rc1+incompatible11.3.1+incompatible
Mattermost fails to canonicalize IPv4-mapped IPv6 addresses before reserved IP validation in github.com/mattermost/mattermost-server
Mattermost fails to canonicalize IPv4-mapped IPv6 addresses before reserved IP validation in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost-server/v5 before v5.3.2-0.20260129133647-5d787969c2d5.
fixedosv:GO-2026-4746
medium11.3.0-rc1+incompatible11.3.1+incompatible
Mattermost fails to properly enforce read permissions in search API endpoints in github.com/mattermost/mattermost-server
Mattermost fails to properly enforce read permissions in search API endpoints in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost-server/v5 before v5.3.2-0.20260107142155-0481bd1fb045.
fixedosv:GO-2026-4745
medium11.3.0-rc1+incompatible11.3.1+incompatible
Mattermost fails to use consistent error responses when handling the /mute command in github.com/mattermost/mattermost-server
Mattermost fails to use consistent error responses when handling the /mute command in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost-server/v5 before v5.3.2-0.20260130144323-5bb5261c72fa.
fixedosv:GO-2026-4744
medium11.3.0-rc1+incompatible11.3.1+incompatible
Mattermost fails to filter invite IDs based on user permissions in github.com/mattermost/mattermost-server
Mattermost fails to filter invite IDs based on user permissions in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost-server/v5 before v5.3.2-0.20260105134819-cc427af41b2a.
fixedosv:GO-2026-4735
medium11.3.0-rc1+incompatible11.3.1+incompatible
Mattermost fails to preserve the redacted state of burn-on-read posts during deletion in github.com/mattermost/mattermost-server
Mattermost fails to preserve the redacted state of burn-on-read posts during deletion in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost-server/v5 before v5.3.2-0.20260127062706-c6b205f0d770.
fixedosv:GO-2026-4734
medium11.3.0-rc1+incompatible11.3.1+incompatible
Mattermost fails to bound memory allocation when processing DOC files in github.com/mattermost/mattermost-server
Mattermost fails to bound memory allocation when processing DOC files in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost-server/v5 before v5.3.2-0.20260123215601-86797c508c44.
fixedosv:GO-2026-4733
medium11.3.0-rc1+incompatible11.3.1+incompatible
Mattermost allows attackers to spoof permalink embeds in github.com/mattermost/mattermost-server
Mattermost allows attackers to spoof permalink embeds in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost-server/v5 before v5.3.2-0.20260123211116-9efe617be8b8.
fixedosv:GO-2026-4732
medium11.3.0-rc1+incompatible11.3.1+incompatible
Mattermost fails to properly handle very long passwords in github.com/mattermost/mattermost-server
Mattermost fails to properly handle very long passwords in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost-server/v5 before v5.3.2-0.20260129164748-7201f42d955f.
fixedosv:GO-2026-4731
medium11.3.0-rc1+incompatible11.3.1+incompatible
Mattermost allows a removed team member to enumerate all public channels within a private team in github.com/mattermost/mattermost-server
Mattermost allows a removed team member to enumerate all public channels within a private team in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost-server/v5 before v5.3.2-0.20260113182106-a18b80ba4c32.
fixedosv:GO-2026-4729
medium11.3.0-rc1+incompatible11.3.1+incompatible
Mattermost fails to bound memory allocation when processing PSD image files in github.com/mattermost/mattermost-server
Mattermost fails to bound memory allocation when processing PSD image files in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost-server/v5 before v5.3.2-0.20260115183946-38b413a27604.
fixedosv:GO-2026-4727
medium11.3.0-rc1+incompatible11.3.1+incompatible
Mattermost fails to limit the size of responses from integration action endpoints in github.com/mattermost/mattermost-server
Mattermost fails to limit the size of responses from integration action endpoints in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost-server/v5 before v5.3.2-0.20260127165411-fe3052073dc6.
fixedosv:GO-2026-4726
medium11.3.0-rc1+incompatible11.3.1+incompatible
Mattermost fails to properly validate User-Agent header tokens in github.com/mattermost/mattermost-server
Mattermost fails to properly validate User-Agent header tokens in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost-server/v5 before v5.3.2-0.20260129181235-1346cf529aef.
fixedosv:GO-2026-4725
medium10.11.0+incompatible\u2014
Mattermost fails to sanitize sensitive data in WebSocket messages in github.com/mattermost/mattermost-server
Mattermost fails to sanitize sensitive data in WebSocket messages in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost-server/v5 before v5.3.2-0.20251210191531-cd17b61de41b.
openosv:GO-2026-4524
medium10.11.0+incompatible\u2014
Mattermost fails to enforce invite permissions when updating team settings in github.com/mattermost/mattermost-server
Mattermost fails to enforce invite permissions when updating team settings in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost-server/v5 before v5.3.2-0.20251215190648-6404ab29acc0.
openosv:GO-2026-4523
medium10.11.0+incompatible\u2014
Mattermost fails to properly validate team membership when processing channel mentions in github.com/mattermost/mattermost-server
Mattermost fails to properly validate team membership when processing channel mentions in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost-server/v5 before v5.3.2-0.20251209134645-761e56bb11cc.
openosv:GO-2026-4521
medium10.11.0+incompatible\u2014
Mattermost fails to properly validate login method restrictions in github.com/mattermost/mattermost-server
Mattermost fails to properly validate login method restrictions in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost-server/v5 before v5.3.2-0.20251212052346-61651b0df7ea.
openosv:GO-2026-4520
medium11.2.0+incompatible11.2.2+incompatible
Mattermost doesn't validate user permissions when creating Jira issues from Mattermost posts in github.com/mattermost/mattermost-server
Mattermost doesn't validate user permissions when creating Jira issues from Mattermost posts in github.com/mattermost/mattermost-server
fixedosv:GO-2026-4496
medium10.11.0+incompatible10.11.10+incompatible
Mattermost doesn't properly validate channel membership at the time of data retrieval in github.com/mattermost/mattermost-server
Mattermost doesn't properly validate channel membership at the time of data retrieval in github.com/mattermost/mattermost-server
fixedosv:GO-2026-4495
mediumany\u2014
Mattermost Server allows an attacker to specify a full pathname of a log file in github.com/mattermost/mattermost-server
Mattermost Server allows an attacker to specify a full pathname of a log file in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost-server before v3.7.4-0.20170404171331-0b5c0794fdcb.
openosv:GO-2026-4487
mediumany\u2014
Mattermost Server SAML implementation does not require encryption or signature verification as default in github.com/mattermost/mattermost-server
Mattermost Server SAML implementation does not require encryption or signature verification as default in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost-server before v3.8.1-0.20170504181128-4f074fed0d65.
openosv:GO-2026-4478
medium3.10.0+incompatible3.10.2+incompatible
Mattermost Server vulnerable to user account takeover when Single Sign-On OAuth2 is used in github.com/mattermost/mattermost-server
Mattermost Server vulnerable to user account takeover when Single Sign-On OAuth2 is used in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost-server before v3.9.2-0.20170714134023-b17fca0d5ee7.
fixedosv:GO-2026-4477
medium3.10.0+incompatible3.10.1+incompatible
Mattermost Server password reset email requests can be sent to attacker-provided email addresses in github.com/mattermost/mattermost-server
Mattermost Server password reset email requests can be sent to attacker-provided email addresses in github.com/mattermost/mattermost-server
fixedosv:GO-2026-4476
medium3.8.0+incompatible3.8.2+incompatible
Mattermost Server has Improper Authorization for Integration Requests in github.com/mattermost/mattermost-server
Mattermost Server has Improper Authorization for Integration Requests in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost-server before v3.6.7-0.20170420152529-0968e4079e0a.
fixedosv:GO-2026-4467
medium3.8.0+incompatible3.8.2+incompatible
Mattermost Server has X.509 Improper Certificate Validation in github.com/mattermost/mattermost-server
Mattermost Server has X.509 Improper Certificate Validation in github.com/mattermost/mattermost-server
fixedosv:GO-2026-4464
medium3.8.0+incompatible3.8.2+incompatible
Mattermost Server uses weak hashing for OAuth, email verification tokens and invitations in github.com/mattermost/mattermost-server
Mattermost Server uses weak hashing for OAuth, email verification tokens and invitations in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost-server before v3.7.5-0.20170421192444-247cd1e51a8c.
fixedosv:GO-2026-4463
medium3.8.0+incompatible3.8.2+incompatible
Mattermost Server server restarts may provide attackers with API access in github.com/mattermost/mattermost-server
Mattermost Server server restarts may provide attackers with API access in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost-server before v3.6.7-0.20170420152529-0968e4079e0a.
fixedosv:GO-2026-4462
medium3.7.0+incompatible3.7.3+incompatible
Mattermost Server does not restrict SAML certificate path for System Administrators in github.com/mattermost/mattermost-server
Mattermost Server does not restrict SAML certificate path for System Administrators in github.com/mattermost/mattermost-server
fixedosv:GO-2026-4460
medium3.10.0+incompatible3.10.2+incompatible
Mattermost Server vulnerable to XSS through channel headers in github.com/mattermost/mattermost-server
Mattermost Server vulnerable to XSS through channel headers in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost-server before v3.9.2-0.20170714014920-312269ad0bd1.
fixedosv:GO-2026-4459
medium11.1.0+incompatible11.1.2+incompatible
Mattermost is vulnerable to DoS due to infinite re-renders on API errors in github.com/mattermost/mattermost-server
Mattermost is vulnerable to DoS due to infinite re-renders on API errors in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: .
fixedosv:GO-2026-4326
medium11.0.1+incompatible11.2.0+incompatible
Mattermost is vulnerable to CPU exhaustion via crafted HTTP request in github.com/mattermost/mattermost-server
Mattermost is vulnerable to CPU exhaustion via crafted HTTP request in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: .
fixedosv:GO-2026-4325
medium4.2.0-rc1+incompatible4.2.0+incompatible
Mattermost Server does not neutralize HTML content in an Email template field in github.com/mattermost/mattermost-server
Mattermost Server does not neutralize HTML content in an Email template field in github.com/mattermost/mattermost-server
fixedosv:GO-2026-4317
medium3.10.0+incompatible3.10.2+incompatible
Mattermost Server has Insufficient Session Expiration when used as an OAuth 2.0 service provider in github.com/mattermost/mattermost-server
Mattermost Server has Insufficient Session Expiration when used as an OAuth 2.0 service provider in github.com/mattermost/mattermost-server
fixedosv:GO-2026-4306
medium3.10.0+incompatible3.10.2+incompatible
Mattermost Server vulnerable to CSRF if CORS is enabled in github.com/mattermost/mattermost-server
Mattermost Server vulnerable to CSRF if CORS is enabled in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: .
fixedosv:GO-2026-4305
mediumany\u2014
CVE-2017-18901 in github.com/mattermost/mattermost-server
CVE-2017-18901 in github.com/mattermost/mattermost-server
openosv:GO-2026-4304
medium4.0.0+incompatible4.0.3+incompatible
Mattermost Server is vulnerable CSV Injection in github.com/mattermost/mattermost-server
Mattermost Server is vulnerable CSV Injection in github.com/mattermost/mattermost-server
fixedosv:GO-2026-4303
medium3.10.0+incompatible3.10.2+incompatible
Mattermost Server vulnerable to XSS via an uploaded file in github.com/mattermost/mattermost-server
Mattermost Server vulnerable to XSS via an uploaded file in github.com/mattermost/mattermost-server
fixedosv:GO-2026-4302
medium4.2.0-rc1+incompatible4.2.0+incompatible
Mattermost Server mishandles redirect denial action in github.com/mattermost/mattermost-server
Mattermost Server mishandles redirect denial action in github.com/mattermost/mattermost-server
fixedosv:GO-2026-4301
medium4.2.0-rc1+incompatible4.2.0+incompatible
Mattermost Server is vulnerable to DoS through maliciously crafted posts in github.com/mattermost/mattermost-server
Mattermost Server is vulnerable to DoS through maliciously crafted posts in github.com/mattermost/mattermost-server
fixedosv:GO-2026-4300
medium4.2.0-rc1+incompatible4.2.0+incompatible
Mattermost Server allows attackers to log sensitive information via DEBUG REST API logging endpoint in github.com/mattermost/mattermost-server
Mattermost Server allows attackers to log sensitive information via DEBUG REST API logging endpoint in github.com/mattermost/mattermost-server
fixedosv:GO-2026-4299
medium4.2.0-rc1+incompatible4.2.0+incompatible
Mattermost Server does not safeguard against phishing via error page links in github.com/mattermost/mattermost-server
Mattermost Server does not safeguard against phishing via error page links in github.com/mattermost/mattermost-server
fixedosv:GO-2026-4298
medium4.2.0-rc1+incompatible4.2.0+incompatible
Mattermost Server has intermittent Authorization bypass for resource-owners in github.com/mattermost/mattermost-server
Mattermost Server has intermittent Authorization bypass for resource-owners in github.com/mattermost/mattermost-server
fixedosv:GO-2026-4297
medium4.2.0-rc1+incompatible4.2.0+incompatible
Mattermost Server is vulnerable to XSS through display name field in github.com/mattermost/mattermost-server
Mattermost Server is vulnerable to XSS through display name field in github.com/mattermost/mattermost-server
fixedosv:GO-2026-4296
medium4.2.0-rc1+incompatible4.2.0+incompatible
Mattermost Server exposes sensitive user status information via REST API version 4 endpoint in github.com/mattermost/mattermost-server
Mattermost Server exposes sensitive user status information via REST API version 4 endpoint in github.com/mattermost/mattermost-server
fixedosv:GO-2026-4295
medium4.3.0-rc1+incompatible4.3.0+incompatible
Mattermost Server is vulnerable to channel invisibility DoS via misformatted post in github.com/mattermost/mattermost-server
Mattermost Server is vulnerable to channel invisibility DoS via misformatted post in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost-server before v4.1.2-0.20171013141717-ee57a5829ab1, before v4.2.1-0.20171013140502-b3e4b0ac9168.
fixedosv:GO-2026-4282
mediumany8.0.0-20251121122154-b57c297c6d7a
Mattermost with Jira plugin enabled has Incorrect Implementation of Authentication Algorithm in github.com/mattermost/mattermost-plugin-jira
Mattermost with Jira plugin enabled has Incorrect Implementation of Authentication Algorithm in github.com/mattermost/mattermost-plugin-jira. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost-plugin-jira before v4.4.1.
fixedosv:GO-2026-4275
medium11.1.0+incompatible11.1.1+incompatible
Mattermost doesn't verify that post actions invoking `/share-issue-publicly` were created by the Jira plugin in github.com/mattermost/mattermost-server
Mattermost doesn't verify that post actions invoking `/share-issue-publicly` were created by the Jira plugin in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost/server/v8 before v8.0.0-20251121122154-b57c297c6d7.
fixedosv:GO-2025-4260
medium11.1.0+incompatible11.1.1+incompatible
Mattermost doesn't validate user channel membership when attaching Mattermost posts as comments to Jira issues in github.com/mattermost/mattermost-server
Mattermost doesn't validate user channel membership when attaching Mattermost posts as comments to Jira issues in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost/server/v8 before v8.0.0-20251121122154-b57c297c6d7.
fixedosv:GO-2025-4259
medium11.0.0-alpha.1+incompatible11.0.4+incompatible
Mattermost has an Invite Token Replay Vulnerability via Channel Membership Manipulation in github.com/mattermost/mattermost
Mattermost has an Invite Token Replay Vulnerability via Channel Membership Manipulation in github.com/mattermost/mattermost
fixedosv:GO-2025-4256
medium10.11.0-rc1+incompatible11.1.0+incompatible
Mattermost has missing redirect URL validation in github.com/mattermost/mattermost
Mattermost has missing redirect URL validation in github.com/mattermost/mattermost. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost before v10.11.5-0.20251016131338-dad6bd7a1509.
fixedosv:GO-2025-4248
medium11.0.0-alpha.1+incompatible11.1.0+incompatible
Mattermost GitHub Plugin Bot Identity Validation Bypass Allows Arbitrary GitHub Reaction Injection in github.com/mattermost/mattermost
Mattermost GitHub Plugin Bot Identity Validation Bypass Allows Arbitrary GitHub Reaction Injection in github.com/mattermost/mattermost. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost before v10.11.7-0.20251106103514-3b05384dd014; github.com/mattermost/mattermost-server before v10.11.7-0.20251106103514-3b05384dd014.
fixedosv:GO-2025-4247
medium4.3.0-rc1+incompatible4.3.0+incompatible
Mattermost Server does not properly restrict use of slash commands in github.com/mattermost/mattermost-server
Mattermost Server does not properly restrict use of slash commands in github.com/mattermost/mattermost-server
fixedosv:GO-2025-4204
medium4.3.0-rc1+incompatible4.3.0+incompatible
Mattermost Server is vulnerable to SQL Injection when executing multiple POST requests in github.com/mattermost/mattermost-server
Mattermost Server is vulnerable to SQL Injection when executing multiple POST requests in github.com/mattermost/mattermost-server
fixedosv:GO-2025-4203
medium4.3.0-rc1+incompatible4.3.0+incompatible
Mattermost Server allows attackers to create buttons that can launch API requests in github.com/mattermost/mattermost-server
Mattermost Server allows attackers to create buttons that can launch API requests in github.com/mattermost/mattermost-server
fixedosv:GO-2025-4202
medium4.3.0-rc1+incompatible4.3.0+incompatible
Mattermost Server is vulnerable to webhook and slash command manipulation in github.com/mattermost/mattermost-server
Mattermost Server is vulnerable to webhook and slash command manipulation in github.com/mattermost/mattermost-server
fixedosv:GO-2025-4201
medium4.3.0-rc1+incompatible4.3.0+incompatible
Mattermost Server allows attackers to gain privileges by accessing unintended API endpoints with users' credentials in github.com/mattermost/mattermost-server
Mattermost Server allows attackers to gain privileges by accessing unintended API endpoints with users' credentials in github.com/mattermost/mattermost-server
fixedosv:GO-2025-4200
medium4.3.0-rc1+incompatible4.3.0+incompatible
Mattermost Server exposes team creator's e-mail address to other members in github.com/mattermost/mattermost-server
Mattermost Server exposes team creator's e-mail address to other members in github.com/mattermost/mattermost-server
fixedosv:GO-2025-4199
medium4.3.0-rc1+incompatible4.3.0+incompatible
Mattermost Server has low entropy for authorization data as an OAuth 2.0 Service Provider in github.com/mattermost/mattermost-server
Mattermost Server has low entropy for authorization data as an OAuth 2.0 Service Provider in github.com/mattermost/mattermost-server
fixedosv:GO-2025-4198
medium4.3.0-rc1+incompatible4.3.0+incompatible
Mattermost Server exposes OAuth personal access tokens to attackers in github.com/mattermost/mattermost-server
Mattermost Server exposes OAuth personal access tokens to attackers in github.com/mattermost/mattermost-server
fixedosv:GO-2025-4197
medium4.3.0-rc1+incompatible4.3.0+incompatible
Mattermost Server allows users with a session ID to revoke another users' session in github.com/mattermost/mattermost-server
Mattermost Server allows users with a session ID to revoke another users' session in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost-server before v4.1.2-0.20171004201910-6be8113eb60c, before v4.2.1-0.20171004192657-8fbbd688ea24.
fixedosv:GO-2025-4191
medium4.3.0-rc1+incompatible4.3.0+incompatible
Mattermost Server is vulnerable to XSS attacks against an OAuth 2.0 allow/deny page in github.com/mattermost/mattermost-server
Mattermost Server is vulnerable to XSS attacks against an OAuth 2.0 allow/deny page in github.com/mattermost/mattermost-server
fixedosv:GO-2025-4190
medium4.3.0-rc1+incompatible4.3.0+incompatible
Mattermost Server is vulnerable to XSS through author_link field in Slack attachments in github.com/mattermost/mattermost-server
Mattermost Server is vulnerable to XSS through author_link field in Slack attachments in github.com/mattermost/mattermost-server
fixedosv:GO-2025-4189
medium4.3.0-rc1+incompatible4.3.0+incompatible
Mattermost Server is vulnerable to Path Traversal when files are stored locally in github.com/mattermost/mattermost-server
Mattermost Server is vulnerable to Path Traversal when files are stored locally in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost-server before v4.1.2-0.20171004201910-6be8113eb60c, from v4.2.0-rc1.0.20171004154238-fadd9514f6e7 before v4.2.1-0.20171004194140-6d3cb2ce07fc.
fixedosv:GO-2025-4187
medium4.3.0-rc1+incompatible4.3.0+incompatible
Mattermost Server does not prevent System Admin from arbitrary file creation in github.com/mattermost/mattermost-server
Mattermost Server does not prevent System Admin from arbitrary file creation in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost-server before v4.1.2-0.20171004201910-6be8113eb60c, from v4.2.0-rc1.0.20171004154238-fadd9514f6e7 before v4.2.1-0.20171004194140-6d3cb2ce07fc.
fixedosv:GO-2025-4186
medium4.0.5-rc1+incompatible4.1.0+incompatible
Mattermost Server exposes team invite IDs through API endpoints in github.com/mattermost/mattermost-server
Mattermost Server exposes team invite IDs through API endpoints in github.com/mattermost/mattermost-server
fixedosv:GO-2025-4185
medium4.5.0-rc1+incompatible4.5.0+incompatible
Mattermost Server vulnerable to Denial of Service through `@` character prefix inserted into JavaScript field names in github.com/mattermost/mattermost-server
Mattermost Server vulnerable to Denial of Service through `@` character prefix inserted into JavaScript field names in github.com/mattermost/mattermost-server
fixedosv:GO-2025-4184
mediumany\u2014
CVE-2017-18870 in github.com/mattermost/mattermost-server
CVE-2017-18870 in github.com/mattermost/mattermost-server
openosv:GO-2025-4183
medium10.11.0+incompatible10.11.5+incompatible
Mattermost fails to validate user permissions in Boards in github.com/mattermost/mattermost
Mattermost fails to validate user permissions in Boards in github.com/mattermost/mattermost
fixedosv:GO-2025-4178
medium10.5.0+incompatible\u2014
Mattermost fails to validate user permissions when deleting comments in Boards in github.com/mattermost/mattermost
Mattermost fails to validate user permissions when deleting comments in Boards in github.com/mattermost/mattermost. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: .
openosv:GO-2025-4172
mediumany8.0.0-20251022210333-acda1fb5dd46
Mattermost fails to to verify the token used during code exchange in github.com/mattermost/mattermost-server
Mattermost fails to to verify the token used during code exchange in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost-server from v10.5.0 before v10.5.13, from v10.11.0 before v10.11.5, from v10.12.0 before v10.12.2, from v11.0.0 before v11.0.3.
fixedosv:GO-2025-4170
mediumany8.0.0-20251015091448-abbf01b9db45
Mattermost fails to sanitize team email addresses in github.com/mattermost/mattermost-server
Mattermost fails to sanitize team email addresses in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost-server from v10.5.0 before v10.5.13, from v10.11.0 before v10.11.5, from v10.12.0 before v10.12.2, from v11.0.0 before v11.0.3.
fixedosv:GO-2025-4169
mediumany8.0.0-20251028000919-d3ed703dc833
Mattermost fails to properly validate OAuth state tokens during OpenID Connect authentication in github.com/mattermost/mattermost-server
Mattermost fails to properly validate OAuth state tokens during OpenID Connect authentication in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost-server from v10.5.0 before v10.5.13, from v10.11.0 before v10.11.5, from v10.12.0 before v10.12.2, from v11.0.0 before v11.0.4.
fixedosv:GO-2025-4168
medium4.3.0-rc1+incompatible4.3.0+incompatible
Mattermost Server is vulnerable to Directory Traversal by System Admins in github.com/mattermost/mattermost-server
Mattermost Server is vulnerable to Directory Traversal by System Admins in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost-server before v4.1.2-0.20171004201910-6be8113eb60, before v4.2.1-0.20171004194140-6d3cb2ce07fc.
fixedosv:GO-2025-4148
mediumany5.1.0
Mattermost Server is vulnerable to a Denial of Service attack through `invite_people` command in github.com/mattermost/mattermost-server
Mattermost Server is vulnerable to a Denial of Service attack through `invite_people` command in github.com/mattermost/mattermost-server
fixedosv:GO-2025-4146
medium10.11.0+incompatible10.11.4+incompatible
Mattermost allows other users to determine when users had read channels via channel member objects in github.com/mattermost/mattermost-server
Mattermost allows other users to determine when users had read channels via channel member objects in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost/server/v8 before v8.0.0-20250905150616-ba86dfc5876b6.
fixedosv:GO-2025-4133
mediumany11.0.0-alpha.1+incompatible
Mattermost allows regular users to access archived channel content and files in github.com/mattermost/mattermost-server
Mattermost allows regular users to access archived channel content and files in github.com/mattermost/mattermost-server
fixedosv:GO-2025-4131
medium10.12.0+incompatible10.12.1+incompatible
Mattermost allows system administrators to access password hashes and MFA secrets in github.com/mattermost/mattermost-server
Mattermost allows system administrators to access password hashes and MFA secrets in github.com/mattermost/mattermost-server
fixedosv:GO-2025-4130
medium10.12.0+incompatible10.12.1+incompatible
Mattermost allows an attacker to edit arbitrary posts via a crafted MSTeams plugin OAuth redirect URL in github.com/mattermost/mattermost-server
Mattermost allows an attacker to edit arbitrary posts via a crafted MSTeams plugin OAuth redirect URL in github.com/mattermost/mattermost-server
fixedosv:GO-2025-4129
mediumany11.1.0+incompatible
Mattermost does not enforce MFA on WebSocket connections in github.com/mattermost/mattermost-server
Mattermost does not enforce MFA on WebSocket connections in github.com/mattermost/mattermost-server
fixedosv:GO-2025-4128
mediumany8.0.0-20250815165020-c8d66301415d
Mattermost fails to properly restrict access to archived channel search API in github.com/mattermost/mattermost
Mattermost fails to properly restrict access to archived channel search API in github.com/mattermost/mattermost. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost/v5 before v5.3.2-0.20250815165020-c8d66301415d; github.com/mattermost/mattermost-server/v5 before v5.3.2-0.20250815165020-c8d66301415d.
fixedosv:GO-2025-4126
medium10.11.0+incompatible10.11.4+incompatible
Mattermost Incorrect Authorization vulnerability in github.com/mattermost/mattermost
Mattermost Incorrect Authorization vulnerability in github.com/mattermost/mattermost
fixedosv:GO-2025-4122
medium4.4.0-rc1+incompatible4.4.3+incompatible
Mattermost Server's OAuth 2.0 service is vulnerable to attack through Missing Authorization in github.com/mattermost/mattermost-server
Mattermost Server's OAuth 2.0 service is vulnerable to attack through Missing Authorization in github.com/mattermost/mattermost-server
fixedosv:GO-2025-4075
mediumany2.1.0+incompatible
Mattermost Server allows XSS via CSRF in github.com/mattermost/mattermost-server
Mattermost Server allows XSS via CSRF in github.com/mattermost/mattermost-server
fixedosv:GO-2025-4066
mediumany2.2.0+incompatible
Mattermost Server: Files may be rendered inline instead of downloaded, allowing script execution in github.com/mattermost/mattermost-server
Mattermost Server: Files may be rendered inline instead of downloaded, allowing script execution in github.com/mattermost/mattermost-server
fixedosv:GO-2025-4065
mediumany2.2.0+incompatible
Mattermost Server is vulnerable to XSS through crafted links in github.com/mattermost/mattermost-server
Mattermost Server is vulnerable to XSS through crafted links in github.com/mattermost/mattermost-server
fixedosv:GO-2025-4064
mediumany3.0.0+incompatible
Mattermost Server exposes account details to any Team Administrator in github.com/mattermost/mattermost-server
Mattermost Server exposes account details to any Team Administrator in github.com/mattermost/mattermost-server
fixedosv:GO-2025-4063
mediumany2.2.0+incompatible
Mattermost Server exposes information stored by a web browser in github.com/mattermost/mattermost-server
Mattermost Server exposes information stored by a web browser in github.com/mattermost/mattermost-server
fixedosv:GO-2025-4062
mediumany\u2014
Mattermost Server exposes sensitive information about team URLs via an API in github.com/mattermost/mattermost-server
Mattermost Server exposes sensitive information about team URLs via an API in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost-server before v2.0.1-0.20160310160916-26ad6d2c7696.
openosv:GO-2025-4061
mediumany3.0.0+incompatible
Mattermost Server allows System Admin to modify LDAP account names and email addresses in github.com/mattermost/mattermost-server
Mattermost Server allows System Admin to modify LDAP account names and email addresses in github.com/mattermost/mattermost-server
fixedosv:GO-2025-4060
mediumany3.0.0+incompatible
Mattermost Server: Insufficient Password-Reset Link Invalidation in github.com/mattermost/mattermost-server
Mattermost Server: Insufficient Password-Reset Link Invalidation in github.com/mattermost/mattermost-server
fixedosv:GO-2025-4059
mediumany3.1.0+incompatible
Mattermost Server is vulnerable to XSS through lack of link relationship attributes `noreferrer` and `noopener` in github.com/mattermost/mattermost-server
Mattermost Server is vulnerable to XSS through lack of link relationship attributes `noreferrer` and `noopener` in github.com/mattermost/mattermost-server
fixedosv:GO-2025-4058
mediumany3.0.0+incompatible
Mattermost Server exposes sensitive information via its System Console UI in github.com/mattermost/mattermost-server
Mattermost Server exposes sensitive information via its System Console UI in github.com/mattermost/mattermost-server
fixedosv:GO-2025-4057
mediumany3.0.0+incompatible
Mattermost Server is vulnerable to XSS via a Legal or Support setting in github.com/mattermost/mattermost-server
Mattermost Server is vulnerable to XSS via a Legal or Support setting in github.com/mattermost/mattermost-server
fixedosv:GO-2025-4056
mediumany3.0.2+incompatible
Mattermost Server's Session ID and Session Token are potentially compromised in github.com/mattermost/mattermost-server
Mattermost Server's Session ID and Session Token are potentially compromised in github.com/mattermost/mattermost-server
fixedosv:GO-2025-4055
mediumany3.0.0+incompatible
Mattermost Server does not check if cookies are used over SSL in github.com/mattermost/mattermost-server
Mattermost Server does not check if cookies are used over SSL in github.com/mattermost/mattermost-server
fixedosv:GO-2025-4054
mediumany3.0.0+incompatible
Mattermost Server allows XSS via redirect URL in github.com/mattermost/mattermost-server
Mattermost Server allows XSS via redirect URL in github.com/mattermost/mattermost-server
fixedosv:GO-2025-4053
mediumany3.2.0+incompatible
Mattermost Server does not enforce rate limits on password change attempts in github.com/mattermost/mattermost-server
Mattermost Server does not enforce rate limits on password change attempts in github.com/mattermost/mattermost-server
fixedosv:GO-2025-4051
mediumany3.1.0+incompatible
Mattermost Server is vulnerable to XSS through customizable theme color-code values in github.com/mattermost/mattermost-server
Mattermost Server is vulnerable to XSS through customizable theme color-code values in github.com/mattermost/mattermost-server
fixedosv:GO-2025-4050
mediumany3.2.0+incompatible
Mattermost Server is vulnerable to Code Injection through its LDAP fields in github.com/mattermost/mattermost-server
Mattermost Server is vulnerable to Code Injection through its LDAP fields in github.com/mattermost/mattermost-server
fixedosv:GO-2025-4048
mediumany\u2014
Mattermost Server: initial_load API exposes unnecessary information in github.com/mattermost/mattermost-server
Mattermost Server: initial_load API exposes unnecessary information in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost-server before v3.1.1.
openosv:GO-2025-4047
mediumany3.2.0+incompatible
Mattermost Server is vulnerable to Uncontrolled Resource Consumption in github.com/mattermost/mattermost-server
Mattermost Server is vulnerable to Uncontrolled Resource Consumption in github.com/mattermost/mattermost-server
fixedosv:GO-2025-4046
mediumany3.5.1+incompatible
Mattermost Server vulnerable to Cross-site Scripting through file preview feature in github.com/mattermost/mattermost-server
Mattermost Server vulnerable to Cross-site Scripting through file preview feature in github.com/mattermost/mattermost-server
fixedosv:GO-2025-4045
medium10.11.0+incompatible10.11.3+incompatible
Mattermost has an Observable Timing Discrepancy vulnerability in github.com/mattermost/mattermost-server
Mattermost has an Observable Timing Discrepancy vulnerability in github.com/mattermost/mattermost-server
fixedosv:GO-2025-4036
medium10.11.0+incompatible10.11.2+incompatible
Mattermost has a Missing Authorization vulnerability in github.com/mattermost/mattermost-server
Mattermost has a Missing Authorization vulnerability in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost/server/v8 before v8.0.0-20250815100400-2d5cdc6e217e.
fixedosv:GO-2025-4035
medium10.11.0+incompatible10.11.2+incompatible
Mattermost has a Missing Authorization vulnerability in github.com/mattermost/mattermost-server
Mattermost has a Missing Authorization vulnerability in github.com/mattermost/mattermost-server
fixedosv:GO-2025-4032
mediumany\u2014
Guest user can discover active public channels in github.com/mattermost/mattermost-server
Guest user can discover active public channels in github.com/mattermost/mattermost-server
openosv:GO-2025-4031
medium10.11.0+incompatible10.11.3+incompatible
Mattermost has an Incorrect Authorization vulnerability in github.com/mattermost/mattermost-server
Mattermost has an Incorrect Authorization vulnerability in github.com/mattermost/mattermost-server
fixedosv:GO-2025-4030
medium10.11.0+incompatible10.11.3+incompatible
Mattermost has a Missing Authorization vulnerability in github.com/mattermost/mattermost-server
Mattermost has a Missing Authorization vulnerability in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost/server/v8 before v8.0.0-20250822083415-01b95392a450.
fixedosv:GO-2025-4029
mediumany0.0.0-20250716054606-3f3e3becfe1d
Mattermost boards plugin fails to restrict download access to files in github.com/mattermost/mattermost-plugin-boards
Mattermost boards plugin fails to restrict download access to files in github.com/mattermost/mattermost-plugin-boards
fixedosv:GO-2025-3978
medium10.10.0+incompatible10.10.2+incompatible
Mattermost Path Traversal vulnerability in github.com/mattermost/mattermost-server
Mattermost Path Traversal vulnerability in github.com/mattermost/mattermost-server
fixedosv:GO-2025-3977
medium10.5.0+incompatible10.5.10+incompatible
Mattermost Open Redirect vulnerability in github.com/mattermost/mattermost-server
Mattermost Open Redirect vulnerability in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost/server/v8 before v8.0.0-202508080704-39bd251fe4f600.
fixedosv:GO-2025-3960
medium10.10.0+incompatible10.10.2+incompatible
Mattermost makes Use of Weak Hash in github.com/mattermost/mattermost-server
Mattermost makes Use of Weak Hash in github.com/mattermost/mattermost-server
fixedosv:GO-2025-3959
medium10.10.0+incompatible10.10.2+incompatible
Mattermost Open Redirect vulnerability in github.com/mattermost/mattermost-server
Mattermost Open Redirect vulnerability in github.com/mattermost/mattermost-server
fixedosv:GO-2025-3958
medium10.10.0+incompatible10.10.2+incompatible
Mattermost Missing Authorization vulnerability in github.com/mattermost/mattermost-server
Mattermost Missing Authorization vulnerability in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost/server/v8 before v8.0.0-20250729073403-517ae758cd02.
fixedosv:GO-2025-3950
medium10.10.0+incompatible10.10.1+incompatible
Mattermost has Potential Server Crash due to Unvalidated Import Data in github.com/mattermost/mattermost-server
Mattermost has Potential Server Crash due to Unvalidated Import Data in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost/server/v8 before v8.0.0-20250708173752-d6b35c41f0ae5.
fixedosv:GO-2025-3911
medium10.10.0+incompatible10.10.1+incompatible
Mattermost Fails to Sanitize File Names in github.com/mattermost/mattermost-server
Mattermost Fails to Sanitize File Names in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost/server/v8 before v8.0.0-20250708173752-d6b35c41f0ae5.
fixedosv:GO-2025-3910
medium10.9.0+incompatible10.9.3+incompatible
Mattermost Fails to Sanitize Path Traversal Sequences in github.com/mattermost/mattermost-server
Mattermost Fails to Sanitize Path Traversal Sequences in github.com/mattermost/mattermost-server
fixedosv:GO-2025-3907
medium10.5.0+incompatible10.5.10+incompatible
Mattermost Server SSRF Vulnerability via the Agents Plugin in github.com/mattermost/mattermost-server
Mattermost Server SSRF Vulnerability via the Agents Plugin in github.com/mattermost/mattermost-server
fixedosv:GO-2025-3906
medium10.9.0+incompatible10.9.3+incompatible
Mattermost Does Not Sanitize the Team Invite ID in github.com/mattermost/mattermost-server
Mattermost Does Not Sanitize the Team Invite ID in github.com/mattermost/mattermost-server
fixedosv:GO-2025-3905
medium10.10.0+incompatible10.10.1+incompatible
Mattermost Fails to Validate Remote Cluster Upload Sessions in github.com/mattermost/mattermost-server
Mattermost Fails to Validate Remote Cluster Upload Sessions in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost/server/v8 before v8.0.0-20250708173752-d6b35c41f0ae5.
fixedosv:GO-2025-3904
medium10.5.0+incompatible10.5.9+incompatible
Mattermost Lack of Access Control Validation in github.com/mattermost/mattermost-server
Mattermost Lack of Access Control Validation in github.com/mattermost/mattermost-server
fixedosv:GO-2025-3903
medium10.5.0+incompatible10.5.9+incompatible
Mattermost Fails to Properly Validate Team Role Modification in github.com/mattermost/mattermost-server
Mattermost Fails to Properly Validate Team Role Modification in github.com/mattermost/mattermost-server
fixedosv:GO-2025-3902
medium10.9.0+incompatible10.9.2+incompatible
Mattermost Fails to Validate File Paths in github.com/mattermost/mattermost-server
Mattermost Fails to Validate File Paths in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost/server/v8 before v8.0.0-20250619095651-9dd0b3943e55.
fixedosv:GO-2025-3901
medium10.8.0+incompatible10.8.2+incompatible
Mattermost Path Traversal vulnerability in github.com/mattermost/mattermost-server
Mattermost Path Traversal vulnerability in github.com/mattermost/mattermost-server
fixedosv:GO-2025-3820
medium10.8.0+incompatible10.8.2+incompatible
Mattermost Missing Authentication for Critical Function in github.com/mattermost/mattermost-server
Mattermost Missing Authentication for Critical Function in github.com/mattermost/mattermost-server
fixedosv:GO-2025-3819
medium10.5.0+incompatible10.5.8+incompatible
Mattermost has Insufficiently Protected Credentials in github.com/mattermost/mattermost-server
Mattermost has Insufficiently Protected Credentials in github.com/mattermost/mattermost-server
fixedosv:GO-2025-3818
medium10.8.0+incompatible10.8.1+incompatible
Mattermost Incorrect Authorization vulnerability in github.com/mattermost/mattermost-server
Mattermost Incorrect Authorization vulnerability in github.com/mattermost/mattermost-server
fixedosv:GO-2025-3797
medium10.8.0+incompatible10.8.1+incompatible
Mattermost Incorrect Authorization vulnerability in github.com/mattermost/mattermost-server
Mattermost Incorrect Authorization vulnerability in github.com/mattermost/mattermost-server
fixedosv:GO-2025-3796
medium10.8.0+incompatible10.8.1+incompatible
Mattermost allows unauthorized channel member management through playbook runs in github.com/mattermost/mattermost-server
Mattermost allows unauthorized channel member management through playbook runs in github.com/mattermost/mattermost-server
fixedosv:GO-2025-3772
medium10.8.0+incompatible10.8.1+incompatible
Mattermost allows an unauthorized Guest user access to Playbook in github.com/mattermost/mattermost-server
Mattermost allows an unauthorized Guest user access to Playbook in github.com/mattermost/mattermost-server
fixedosv:GO-2025-3771
medium10.8.0+incompatible10.8.1+incompatible
Mattermost allows authenticated users to write files to arbitrary locations in github.com/mattermost/mattermost-server
Mattermost allows authenticated users to write files to arbitrary locations in github.com/mattermost/mattermost-server
fixedosv:GO-2025-3769
medium10.5.0+incompatible10.5.5+incompatible
Mattermost allows guest users to view information about public teams they are not members of in github.com/mattermost/mattermost-server
Mattermost allows guest users to view information about public teams they are not members of in github.com/mattermost/mattermost-server
fixedosv:GO-2025-3757
medium10.7.0+incompatible10.7.2+incompatible
Mattermost allows authenticated administrator to execute LDAP search filter injection in github.com/mattermost/mattermost-server
Mattermost allows authenticated administrator to execute LDAP search filter injection in github.com/mattermost/mattermost-server
fixedosv:GO-2025-3756
medium10.7.0-rc1+incompatible10.7.1+incompatible
Mattermost fails to properly invalidate personal access tokens upon user deactivation in github.com/mattermost/mattermost-server
Mattermost fails to properly invalidate personal access tokens upon user deactivation in github.com/mattermost/mattermost-server
fixedosv:GO-2025-3731
medium10.6.0-rc1+incompatible10.7.1+incompatible
Mattermost fails to properly enforce access controls for guest users in github.com/mattermost/mattermost-server
Mattermost fails to properly enforce access controls for guest users in github.com/mattermost/mattermost-server
fixedosv:GO-2025-3730
medium10.7.0-rc1+incompatible10.7.1+incompatible
Mattermost fails to clear Google OAuth credentials in github.com/mattermost/mattermost-server
Mattermost fails to clear Google OAuth credentials in github.com/mattermost/mattermost-server
fixedosv:GO-2025-3729
medium10.6.0-rc1+incompatible10.7.1+incompatible
Mattermost fails to properly enforce access control restrictions for System Manager roles in github.com/mattermost/mattermost-server
Mattermost fails to properly enforce access control restrictions for System Manager roles in github.com/mattermost/mattermost-server
fixedosv:GO-2025-3728
medium10.7.0-rc1+incompatible10.7.1+incompatible
Mattermost improperly allows team administrators to modify team invites in github.com/mattermost/mattermost-server
Mattermost improperly allows team administrators to modify team invites in github.com/mattermost/mattermost-server
fixedosv:GO-2025-3724
medium10.5.0+incompatible10.5.3+incompatible
Mattermost Fails to Check User Access to `ExperimentalSettings` in github.com/mattermost/mattermost-server
Mattermost Fails to Check User Access to `ExperimentalSettings` in github.com/mattermost/mattermost-server
fixedosv:GO-2025-3694
medium10.6.0+incompatible10.6.2+incompatible
Mattermost Fails to Validate Team Invite Permissions in github.com/mattermost/mattermost-server
Mattermost Fails to Validate Team Invite Permissions in github.com/mattermost/mattermost-server
fixedosv:GO-2025-3693
medium10.6.0+incompatible10.6.2+incompatible
Mattermost Fails to Lockout LDAP Users After Repeated Login Failures in github.com/mattermost/mattermost-server
Mattermost Fails to Lockout LDAP Users After Repeated Login Failures in github.com/mattermost/mattermost-server
fixedosv:GO-2025-3692
medium10.5.0+incompatible10.5.3+incompatible
Mattermost Fails to Verify User's Permissions When Accessing Groups in github.com/mattermost/mattermost-server
Mattermost Fails to Verify User's Permissions When Accessing Groups in github.com/mattermost/mattermost-server
fixedosv:GO-2025-3691
mediumany1.41.0
Mattermost Playbooks fails to properly validate permissions in github.com/mattermost/mattermost-plugin-playbooks
Mattermost Playbooks fails to properly validate permissions in github.com/mattermost/mattermost-plugin-playbooks. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: .
fixedosv:GO-2025-3644
mediumany1.41.0
Mattermost Playbooks fails to validate the uniqueness and quantity of task actions in github.com/mattermost/mattermost-plugin-playbooks
Mattermost Playbooks fails to validate the uniqueness and quantity of task actions in github.com/mattermost/mattermost-plugin-playbooks. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: .
fixedosv:GO-2025-3643
mediumany1.41.0
Mattermost Playbooks fails to properly validate the props used by the RetrospectivePost custom post type in github.com/mattermost/mattermost-plugin-playbooks
Mattermost Playbooks fails to properly validate the props used by the RetrospectivePost custom post type in github.com/mattermost/mattermost-plugin-playbooks. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: .
fixedosv:GO-2025-3642
medium10.5.0+incompatible10.5.2+incompatible
Mattermost Incorrect Authorization vulnerability in github.com/mattermost/mattermost-server
Mattermost Incorrect Authorization vulnerability in github.com/mattermost/mattermost-server
fixedosv:GO-2025-3623
medium10.5.0+incompatible10.5.1+incompatible
Mattermost doesn't restrict domains LLM can request to contact upstream in github.com/mattermost/mattermost-server
Mattermost doesn't restrict domains LLM can request to contact upstream in github.com/mattermost/mattermost-server
fixedosv:GO-2025-3622
medium10.5.0+incompatible10.5.2+incompatible
Mattermost Incorrect Authorization vulnerability in github.com/mattermost/mattermost-server
Mattermost Incorrect Authorization vulnerability in github.com/mattermost/mattermost-server
fixedosv:GO-2025-3621
medium10.5.0+incompatible10.5.2+incompatible
Mattermost Missing Authentication for Critical Function in github.com/mattermost/mattermost-server
Mattermost Missing Authentication for Critical Function in github.com/mattermost/mattermost-server
fixedosv:GO-2025-3620
medium10.5.0+incompatible10.5.2+incompatible
Mattermost Incorrect Authorization vulnerability in github.com/mattermost/mattermost-server
Mattermost Incorrect Authorization vulnerability in github.com/mattermost/mattermost-server
fixedosv:GO-2025-3619
medium10.5.0+incompatible10.5.2+incompatible
Mattermost vulnerable to Observable Timing Discrepancy in github.com/mattermost/mattermost-plugin-msteams
Mattermost vulnerable to Observable Timing Discrepancy in github.com/mattermost/mattermost-plugin-msteams. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost-plugin-msteams before v2.1.0.
fixedosv:GO-2025-3618
medium10.5.0+incompatible10.5.2+incompatible
Mattermost Incorrect Authorization vulnerability in github.com/mattermost/mattermost-server
Mattermost Incorrect Authorization vulnerability in github.com/mattermost/mattermost-server
fixedosv:GO-2025-3611
medium10.5.0+incompatible10.5.2+incompatible
Mattermost vulnerable to Incorrect Implementation of Authentication Algorithm in github.com/mattermost/mattermost-server
Mattermost vulnerable to Incorrect Implementation of Authentication Algorithm in github.com/mattermost/mattermost-server
fixedosv:GO-2025-3610
medium10.5.0+incompatible10.5.2+incompatible
Mattermost Fails to Restrict Certain Operations on System Admins in github.com/mattermost/mattermost-server
Mattermost Fails to Restrict Certain Operations on System Admins in github.com/mattermost/mattermost-server
fixedosv:GO-2025-3609
medium9.11.0+incompatible9.11.9+incompatible
Mattermost Fails to Enforce Proper Access Controls on `/api/v4/audits` Endpoint in github.com/mattermost/mattermost-server
Mattermost Fails to Enforce Proper Access Controls on `/api/v4/audits` Endpoint in github.com/mattermost/mattermost-server
fixedosv:GO-2025-3604
medium10.4.0+incompatible10.4.3+incompatible
Mattermost allows members with permission to convert public channels to private and convert private to public in github.com/mattermost/mattermost-server
Mattermost allows members with permission to convert public channels to private and convert private to public in github.com/mattermost/mattermost-server
fixedosv:GO-2025-3556
medium9.11.0+incompatible9.11.9+incompatible
Mattermost fail to prompt for explicit approval before adding a team admin to a private channel in github.com/mattermost/mattermost-server
Mattermost fail to prompt for explicit approval before adding a team admin to a private channel in github.com/mattermost/mattermost-server
fixedosv:GO-2025-3555
medium10.5.0+incompatible10.5.1+incompatible
Mattermost Fails to Restrict Bookmark Creation and Updates in Archived Channels in github.com/mattermost/mattermost-server
Mattermost Fails to Restrict Bookmark Creation and Updates in Archived Channels in github.com/mattermost/mattermost-server
fixedosv:GO-2025-3552
medium10.5.0+incompatible10.5.1+incompatible
Mattermost Fails to Enforce MFA on Plugin Endpoints in github.com/mattermost/mattermost-server
Mattermost Fails to Enforce MFA on Plugin Endpoints in github.com/mattermost/mattermost-server
fixedosv:GO-2025-3551
medium10.5.0+incompatible10.5.1+incompatible
Mattermost Fails to Restrict Command Execution in Archived Channels in github.com/mattermost/mattermost-server
Mattermost Fails to Restrict Command Execution in Archived Channels in github.com/mattermost/mattermost-server
fixedosv:GO-2025-3550
medium10.5.0+incompatible10.5.1+incompatible
Mattermost Fails to Enforce Certain Search APIs in github.com/mattermost/mattermost-server
Mattermost Fails to Enforce Certain Search APIs in github.com/mattermost/mattermost-server
fixedosv:GO-2025-3549
medium9.11.0+incompatible9.11.9+incompatible
Mattermost Fails to Properly Perform Viewer Role Authorization in github.com/mattermost/mattermost-server
Mattermost Fails to Properly Perform Viewer Role Authorization in github.com/mattermost/mattermost-server
fixedosv:GO-2025-3534
medium10.4.0-rc1+incompatible10.4.2+incompatible
Mattermost allows reading arbitrary files in github.com/mattermost/mattermost-server
Mattermost allows reading arbitrary files in github.com/mattermost/mattermost-server
fixedosv:GO-2025-3483
medium10.4.0-rc1+incompatible10.4.2+incompatible
Mattermost fails to invalidate all active sessions when converting a user to a bot in github.com/mattermost/mattermost-server
Mattermost fails to invalidate all active sessions when converting a user to a bot in github.com/mattermost/mattermost-server
fixedosv:GO-2025-3482
medium10.4.0-rc1+incompatible10.4.2+incompatible
Mattermost fails to restrict channel export of archived channels in github.com/mattermost/mattermost-server
Mattermost fails to restrict channel export of archived channels in github.com/mattermost/mattermost-server
fixedosv:GO-2025-3481
medium10.4.0-rc1+incompatible10.4.2+incompatible
Mattermost allows reading arbitrary files related to importing boards in github.com/mattermost/mattermost-server
Mattermost allows reading arbitrary files related to importing boards in github.com/mattermost/mattermost-server
fixedosv:GO-2025-3480
medium10.2.0+incompatible10.2.1+incompatible
Mattermost webapp crash via a crafted post in github.com/mattermost/mattermost-server
Mattermost webapp crash via a crafted post in github.com/mattermost/mattermost-server
fixedosv:GO-2025-3407
medium10.2.0+incompatible10.2.1+incompatible
Mattermost fails to properly validate post props in github.com/mattermost/mattermost-server
Mattermost fails to properly validate post props in github.com/mattermost/mattermost-server
fixedosv:GO-2025-3394
medium10.2.0+incompatible10.2.1+incompatible
Mattermost Incorrect Type Conversion or Cast in github.com/mattermost/mattermost-server
Mattermost Incorrect Type Conversion or Cast in github.com/mattermost/mattermost-server
fixedosv:GO-2025-3393
medium10.2.0+incompatible10.2.1+incompatible
Mattermost fails to properly validate post props in github.com/mattermost/mattermost-server
Mattermost fails to properly validate post props in github.com/mattermost/mattermost-server
fixedosv:GO-2025-3392
mediumany10.3.0+incompatible
Mattermost has Improper Check for Unusual or Exceptional Conditions in github.com/mattermost/mattermost-server
Mattermost has Improper Check for Unusual or Exceptional Conditions in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: .
fixedosv:GO-2025-3380
medium10.2.0+incompatible10.2.1+incompatible
Mattermost Improper Validation of Specified Type of Input vulnerability in github.com/mattermost/mattermost-server
Mattermost Improper Validation of Specified Type of Input vulnerability in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost-server from v9.11.0 before v9.11.16.
fixedosv:GO-2025-3379
medium9.11.0+incompatible\u2014
Mattermost Incorrect Authorization vulnerability in github.com/mattermost/mattermost-server
Mattermost Incorrect Authorization vulnerability in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost-server before v9.11.16.
openosv:GO-2025-3377
medium10.1.0+incompatible10.1.3+incompatible
Mattermost Data Amplification vulnerability in github.com/mattermost/mattermost-server
Mattermost Data Amplification vulnerability in github.com/mattermost/mattermost-server
fixedosv:GO-2024-3340
medium10.1.0+incompatible10.1.3+incompatible
Mattermost Race Condition vulnerability in github.com/mattermost/mattermost-server
Mattermost Race Condition vulnerability in github.com/mattermost/mattermost-server
fixedosv:GO-2024-3338
medium10.1.0+incompatible10.1.3+incompatible
Mattermost Improper Validation of Specified Type of Input vulnerability in github.com/mattermost/mattermost-server
Mattermost Improper Validation of Specified Type of Input vulnerability in github.com/mattermost/mattermost-server
fixedosv:GO-2024-3337
mediumany0.0.0-20240209181221-674f549daf0e
Mattermost Server Resource Exhaustion in github.com/mattermost/mattermost-server
Mattermost Server Resource Exhaustion in github.com/mattermost/mattermost-server
fixedosv:GO-2024-3334
mediumany8.0.0-20240926115259-20ed58906adc
Mattermost server allows authenticated user to delete arbitrary post in github.com/mattermost/mattermost-server
Mattermost server allows authenticated user to delete arbitrary post in github.com/mattermost/mattermost-server
fixedosv:GO-2024-3235
mediumany8.0.0-20240926115259-20ed58906adc
Mattermost Server vulnerable to application crash from attacker-generated large response in github.com/mattermost/mattermost-server
Mattermost Server vulnerable to application crash from attacker-generated large response in github.com/mattermost/mattermost-server
fixedosv:GO-2024-3234
mediumany8.0.0-20240926115259-20ed58906adc
Mattermost Server Path Traversal vulnerability that leads to Cross-Site Request Forgery in github.com/mattermost/mattermost-server
Mattermost Server Path Traversal vulnerability that leads to Cross-Site Request Forgery in github.com/mattermost/mattermost-server
fixedosv:GO-2024-3233
mediumany8.0.0-20240813135334-8f3a13122f55
Mattermost Server allows user to get private channel names in github.com/mattermost/mattermost-server
Mattermost Server allows user to get private channel names in github.com/mattermost/mattermost-server
fixedosv:GO-2024-3232
mediumany8.0.0-20240821220019-0d6b1070a26f
Mattermost incorrectly issues two sessions when using desktop SSO in github.com/mattermost/mattermost-server
Mattermost incorrectly issues two sessions when using desktop SSO in github.com/mattermost/mattermost-server
fixedosv:GO-2024-3227
mediumany8.0.0-20240806094731-69a8b3df0f9f
Mattermost fails to strip `embeds` from `metadata` when broadcasting `posted` events in github.com/mattermost/mattermost-server
Mattermost fails to strip `embeds` from `metadata` when broadcasting `posted` events in github.com/mattermost/mattermost-server
fixedosv:GO-2024-3164
medium9.10.0+incompatible9.10.1+incompatible
Mattermost Cross-Site Request Forgery vulnerability in github.com/mattermost/mattermost-server
Mattermost Cross-Site Request Forgery vulnerability in github.com/mattermost/mattermost-server
fixedosv:GO-2024-3097
medium9.10.0+incompatible9.10.1+incompatible
Mattermost allows remote/synthetic users to create sessions, reset passwords in github.com/mattermost/mattermost-server
Mattermost allows remote/synthetic users to create sessions, reset passwords in github.com/mattermost/mattermost-server
fixedosv:GO-2024-3096
medium9.10.0+incompatible9.10.1+incompatible
Mattermost doesn't restrict which roles can promote a user as system admin in github.com/mattermost/mattermost-server
Mattermost doesn't restrict which roles can promote a user as system admin in github.com/mattermost/mattermost-server
fixedosv:GO-2024-3094
medium9.10.0+incompatible9.10.1+incompatible
Mattermost doesn't redact remote users' original email addresses in github.com/mattermost/mattermost-server
Mattermost doesn't redact remote users' original email addresses in github.com/mattermost/mattermost-server
fixedosv:GO-2024-3093
medium9.9.0+incompatible9.9.1+incompatible
Mattermost allows unsolicited invites to expose access to local channels in github.com/mattermost/mattermost-server
Mattermost allows unsolicited invites to expose access to local channels in github.com/mattermost/mattermost-server
fixedosv:GO-2024-3092
medium9.10.0+incompatible9.10.1+incompatible
Mattermost allows user with systems manager role with read-only access to teams to perform write operations on teams in github.com/mattermost/mattermost-server
Mattermost allows user with systems manager role with read-only access to teams to perform write operations on teams in github.com/mattermost/mattermost-server
fixedosv:GO-2024-3091
medium9.10.0+incompatible9.10.1+incompatible
Mattermost allows team admin user without "Add Team Members" permission to disable invite URL in github.com/mattermost/mattermost-server
Mattermost allows team admin user without "Add Team Members" permission to disable invite URL in github.com/mattermost/mattermost-server
fixedosv:GO-2024-3090
medium9.10.0+incompatible9.10.1+incompatible
Mattermost allows guest user with read access to upload files to a channel in github.com/mattermost/mattermost-server
Mattermost allows guest user with read access to upload files to a channel in github.com/mattermost/mattermost-server
fixedosv:GO-2024-3089
medium9.9.0+incompatible9.9.1+incompatible
Mattermost did not properly restrict channel creation in github.com/mattermost/mattermost-server
Mattermost did not properly restrict channel creation in github.com/mattermost/mattermost-server
fixedosv:GO-2024-3032
medium9.9.0+incompatible9.9.1+incompatible
Mattermost allows a remote actor to make an arbitrary local channel read-only in github.com/mattermost/mattermost-server
Mattermost allows a remote actor to make an arbitrary local channel read-only in github.com/mattermost/mattermost-server
fixedosv:GO-2024-3031
medium9.9.0+incompatible9.9.1+incompatible
Mattermost failed to properly validate synced reactions in github.com/mattermost/mattermost-server
Mattermost failed to properly validate synced reactions in github.com/mattermost/mattermost-server
fixedosv:GO-2024-3030
medium9.9.0+incompatible9.9.1+incompatible
Mattermost failed to properly validate that the channel that comes from the sync message is a shared channel in github.com/mattermost/mattermost-server
Mattermost failed to properly validate that the channel that comes from the sync message is a shared channel in github.com/mattermost/mattermost-server
fixedosv:GO-2024-3028
medium9.9.0+incompatible9.9.1+incompatible
Mattermost failed to disallow the modification of local users when syncing users in shared channels in github.com/mattermost/mattermost-server
Mattermost failed to disallow the modification of local users when syncing users in shared channels in github.com/mattermost/mattermost-server
fixedosv:GO-2024-3025
medium9.9.0+incompatible9.9.1+incompatible
Mattermost allows a user on a remote to set their remote username prop to an arbitrary string in github.com/mattermost/mattermost-server
Mattermost allows a user on a remote to set their remote username prop to an arbitrary string in github.com/mattermost/mattermost-server
fixedosv:GO-2024-3024
medium9.9.0+incompatible9.9.1+incompatible
Mattermost allows remote actor to create/update/delete posts in arbitrary channels in github.com/mattermost/mattermost-server
Mattermost allows remote actor to create/update/delete posts in arbitrary channels in github.com/mattermost/mattermost-server
fixedosv:GO-2024-3023
medium9.9.0+incompatible9.9.1+incompatible
Mattermost allows remote actor to set arbitrary RemoteId values for synced users in github.com/mattermost/mattermost-server
Mattermost allows remote actor to set arbitrary RemoteId values for synced users in github.com/mattermost/mattermost-server
fixedosv:GO-2024-3022
medium9.9.0+incompatible9.9.1+incompatible
Mattermost allows a remote actor to permanently delete local data by abusing dangerous error handling in github.com/mattermost/mattermost-server
Mattermost allows a remote actor to permanently delete local data by abusing dangerous error handling in github.com/mattermost/mattermost-server
fixedosv:GO-2024-3020
medium9.6.0-rc1+incompatible9.6.1+incompatible
Mattermost fails to limit the number of active sessions in github.com/mattermost/mattermost-server
Mattermost fails to limit the number of active sessions in github.com/mattermost/mattermost-server
fixedosv:GO-2024-2798
medium9.6.0-rc1+incompatible9.6.1+incompatible
Mattermost's detailed error messages reveal the full file path in github.com/mattermost/mattermost-server
Mattermost's detailed error messages reveal the full file path in github.com/mattermost/mattermost-server
fixedosv:GO-2024-2797
medium9.6.0-rc1+incompatible9.6.1+incompatible
Mattermost fails to limit the size of a request path in github.com/mattermost/mattermost-server
Mattermost fails to limit the size of a request path in github.com/mattermost/mattermost-server
fixedosv:GO-2024-2796
medium9.6.0-rc1+incompatible9.6.1+incompatible
Mattermost crashes web clients via a malformed custom status in github.com/mattermost/mattermost-server
Mattermost crashes web clients via a malformed custom status in github.com/mattermost/mattermost-server
fixedosv:GO-2024-2795
medium9.6.0-rc1+incompatible9.6.1+incompatible
Mattermost fails to fully validate role changes in github.com/mattermost/mattermost-server
Mattermost fails to fully validate role changes in github.com/mattermost/mattermost-server
fixedosv:GO-2024-2794
medium9.5.0+incompatible9.5.3+incompatible
Mattermost allows team admins to promote guests to team admins in github.com/mattermost/mattermost-server
Mattermost allows team admins to promote guests to team admins in github.com/mattermost/mattermost-server
fixedosv:GO-2024-2793
mediumany\u2014
Mattermost Server Improper Access Control in github.com/mattermost/mattermost-server
Mattermost Server Improper Access Control in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost/server/v8 before v8.1.11.
openosv:GO-2024-2707
medium9.5.0+incompatible9.5.2+incompatible
Mattermost Server Improper Access Control in github.com/mattermost/mattermost-server
Mattermost Server Improper Access Control in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost/server/v8 from v8.1.0 before v8.1.11.
fixedosv:GO-2024-2706
medium9.5.0+incompatible9.5.2+incompatible
Mattermost fails to authenticate the source of certain types of post actions in github.com/mattermost/mattermost-server
Mattermost fails to authenticate the source of certain types of post actions in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost/server/v8 from v8.1.0 before v8.1.11.
fixedosv:GO-2024-2696
medium9.5.0+incompatible9.5.2+incompatible
Mattermost Server doesn't limit the number of user preferences in github.com/mattermost/mattermost-server
Mattermost Server doesn't limit the number of user preferences in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost/server/v8 from v8.1.0 before v8.1.11.
fixedosv:GO-2024-2695
medium9.0.0+incompatible9.4.0+incompatible
Mattermost incorrectly allows access individual posts in github.com/mattermost/mattermost-server
Mattermost incorrectly allows access individual posts in github.com/mattermost/mattermost-server
fixedosv:GO-2024-2635
medium9.0.0+incompatible9.4.2+incompatible
Mattermost fails to properly restrict the access of files attached to posts in github.com/mattermost/mattermost-server
Mattermost fails to properly restrict the access of files attached to posts in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost/server/v8 before v8.1.9.
fixedosv:GO-2024-2595
medium9.4.0+incompatible9.4.2+incompatible
Mattermost fails to limit the number of role names in github.com/mattermost/mattermost-server
Mattermost fails to limit the number of role names in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost/server/v8 before v8.1.9.
fixedosv:GO-2024-2594
medium9.4.0+incompatible9.4.2+incompatible
Mattermost fails to check the "invite_guest" permission in github.com/mattermost/mattermost-server
Mattermost fails to check the "invite_guest" permission in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost/server/v8 before v8.1.9.
fixedosv:GO-2024-2593
medium9.3.0+incompatible9.3.1+incompatible
Mattermost allows attackers access to posts in channels they are not a member of in github.com/mattermost/mattermost-server
Mattermost allows attackers access to posts in channels they are not a member of in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost/server/v8 before v8.1.9.
fixedosv:GO-2024-2592
medium9.3.0+incompatible9.3.1+incompatible
Mattermost post fetching without auditing in compliance export in github.com/mattermost/mattermost-server
Mattermost post fetching without auditing in compliance export in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost/server/v8 before v8.1.9.
fixedosv:GO-2024-2591
medium9.4.0+incompatible9.4.2+incompatible
Mattermost leaks details of AD/LDAP groups of a teams in github.com/mattermost/mattermost-server
Mattermost leaks details of AD/LDAP groups of a teams in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost/server/v8 before v8.1.9.
fixedosv:GO-2024-2590
medium9.3.0+incompatible9.3.1+incompatible
Mattermost denial of service through long emoji value in github.com/mattermost/mattermost-server
Mattermost denial of service through long emoji value in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost/server/v8 before v8.1.9.
fixedosv:GO-2024-2589
medium9.0.0+incompatible9.4.2+incompatible
Mattermost race condition in github.com/mattermost/mattermost-server
Mattermost race condition in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost/server/v8 before v8.1.9.
fixedosv:GO-2024-2588
medium9.0.0+incompatible9.3.0+incompatible
Mattermost fails to check the required permissions in github.com/mattermost/mattermost-server
Mattermost fails to check the required permissions in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost/server/v8 before v8.1.8.
fixedosv:GO-2024-2566
medium9.2.0+incompatible9.2.4+incompatible
Mattermost vulnerable to denial of service via large number of emoji reactions in github.com/mattermost/mattermost-server
Mattermost vulnerable to denial of service via large number of emoji reactions in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost/server/v8 before v8.1.8.
fixedosv:GO-2024-2541
mediumany\u2014
Mattermost viewing archived public channels permissions vulnerability in github.com/mattermost/mattermost-server
Mattermost viewing archived public channels permissions vulnerability in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost-server before v7.8.10; github.com/mattermost/mattermost/server/v8 before v8.1.1.
openosv:GO-2024-2450
mediumany8.1.7+incompatible
Mattermost notified all users in the channel when using WebSockets to respond individually in github.com/mattermost/mattermost-server
Mattermost notified all users in the channel when using WebSockets to respond individually in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost/server/v8 before v8.1.7.
fixedosv:GO-2024-2448
mediumany\u2014
Mattermost Cross-site Scripting vulnerability in github.com/mattermost/mattermost-server
Mattermost Cross-site Scripting vulnerability in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost/server/v8 before v8.1.7.
openosv:GO-2024-2446
mediumany\u2014
Mattermost allows demoted guests to change group names in github.com/mattermost/mattermost-server
Mattermost allows demoted guests to change group names in github.com/mattermost/mattermost-server. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/mattermost/mattermost/server/v8 before v8.1.7.
openosv:GO-2024-2444
mediumany5.20.0
Mattermost Server Sensitive Data Exposure in github.com/mattermost/mattermost
Mattermost Server Sensitive Data Exposure in github.com/mattermost/mattermost
fixedosv:GO-2023-1939
mediumany5.37.9
Improper Privilege Management in Mattermost in github.com/mattermost/mattermost-server
Improper Privilege Management in Mattermost in github.com/mattermost/mattermost-server
fixedosv:GO-2022-0616
mediumany5.39.0
Cross-site Scripting in Mattermost in github.com/mattermost/mattermost-server
Cross-site Scripting in Mattermost in github.com/mattermost/mattermost-server
fixedosv:GO-2022-0604
mediumany6.5.0
Improper Control of a Resource Through its Lifetime in Mattermost in github.com/mattermost/mattermost-server
Improper Control of a Resource Through its Lifetime in Mattermost in github.com/mattermost/mattermost-server
fixedosv:GO-2022-0599
mediumany6.4.2
Resource exhaustion in Mattermost in github.com/mattermost/mattermost-server
Resource exhaustion in Mattermost in github.com/mattermost/mattermost-server
fixedosv:GO-2022-0595
medium6.4.06.5.0
Insecure plugin handling in Mattermost in github.com/mattermost/mattermost-server
Insecure plugin handling in Mattermost in github.com/mattermost/mattermost-server
fixedosv:GO-2022-0576
medium6.7.06.7.1
Mattermost users could access some sensitive information via API call in github.com/mattermost/mattermost-server
Mattermost users could access some sensitive information via API call in github.com/mattermost/mattermost-server
fixedosv:GO-2022-0540
mediumany8.0.0-20260123215601-86797c508c44
Mattermost fails to bound memory allocation when processing DOC files
Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2, 10.11.x <= 10.11.10 fail to bound memory allocation when processing DOC files which allows an authenticated attacker to cause server memory exhaustion and denial of service via uploading a specially crafted DOC file.. Mattermost Advisory ID: MMSA-2026-00581
fixedosv:GHSA-xv2p-wchj-qjhp
mediumany8.0.0-20260107144005-c7f6efdfb035
Mattermost fails to validate team-specific upload_file permissions
Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2, 10.11.x <= 10.11.10 fail to validate team-specific upload_file permissions which allows a guest user to post files in channels where they lack upload_file permission via uploading files in a team where they have permission and reusing the file metadata in a POST request to a different team. Mattermost Advisory ID: MMSA-2025-00553
fixedosv:GHSA-xpvf-6qcc-9jqc
mediumany11.1.0
Mattermost does not enforce MFA on WebSocket connections
Mattermost versions < 11 fail to enforce multi-factor authentication on WebSocket connections which allows unauthenticated users to access sensitive information via WebSocket events.
fixedosv:GHSA-xpg8-8xpv-948p
mediumany4.1.2-0.20171013141717-ee57a5829ab1
Mattermost Server is vulnerable to channel invisibility DoS via misformatted post
An issue was discovered in Mattermost Server before 4.3.0, 4.2.1, and 4.1.2. It allows attackers to cause a denial of service (channel invisibility) via a misformated post.
fixedosv:GHSA-x6mw-hf2j-vqpc
medium10.8.010.8.4
Mattermost Fails to Sanitize Path Traversal Sequences
Mattermost versions 10.8.x <= 10.8.3, 10.5.x <= 10.5.8, 9.11.x <= 9.11.17, 10.9.x <= 10.9.2 fails to sanitize path traversal sequences in template file destination paths, which allows a system admin to perform path traversal attacks via malicious path components, potentially enabling malicious file placement outside intended directories.
fixedosv:GHSA-x67c-v8jr-p29r
medium10.12.010.12.2
Mattermost has an Invite Token Replay Vulnerability via Channel Membership Manipulation
Mattermost versions 10.11.x < 10.11.5, 11.0.x < 11.0.4, 10.12.x < 10.12.2 fail to invalidate remote cluster invite tokens when using the legacy (version 1) protocol or when the confirming party does not provide a refreshed token, which allows an attacker who has obtained an invite token to authenticate as the remote cluster and perform limited actions on shared channels even after the invitation has been legitimately confirmed.
fixedosv:GHSA-x3r8-2hmh-89f5
mediumany3.6.7-0.20170420152529-0968e4079e0a
Mattermost Server has Improper Authorization for Integration Requests
An issue was discovered in Mattermost Server before 3.8.2, 3.7.5, and 3.6.7. API endpoint access control does not honor an integration permission restriction.
fixedosv:GHSA-x33g-375j-jhf7
medium10.8.010.8.2
Mattermost Path Traversal vulnerability
Mattermost versions 10.8.x <= 10.8.1, 10.7.x <= 10.7.3, 10.5.x <= 10.5.7, 9.11.x <= 9.11.16 fail to sanitize input paths of file attachments in the bulk import JSONL file, which allows a system admin to read arbitrary system files via path traversal.
fixedosv:GHSA-wvw2-3jh4-4c39
mediumany4.0.5
Mattermost Server does not neutralize HTML content in an Email template field
An issue was discovered in Mattermost Server before 4.2.0, 4.1.1, and 4.0.5. E-mail templates can have a field in which HTML content is not neutralized.
fixedosv:GHSA-wj5w-qghh-gvqp
medium9.6.0-rc19.6.1
Mattermost fails to limit the number of active sessions
Mattermost versions 8.1.x before 8.1.12, 9.6.x before 9.6.1, 9.5.x before 9.5.3, 9.4.x before 9.4.5 fail to limit the number of active sessions, which allows an authenticated attacker to crash the server via repeated requests to the getSessions API after flooding the sessions table.
fixedosv:GHSA-wj37-mpq9-xrcm
mediumany0.0.0-20250513065225-4ae5d647fb88
Mattermost Incorrect Authorization vulnerability
Mattermost versions 10.5.x <= 10.5.5, 9.11.x <= 9.11.15, 10.8.x <= 10.8.0, 10.7.x <= 10.7.2, 10.6.x <= 10.6.5 fail to properly validate channel membership when retrieving playbook run metadata, allowing authenticated users who are playbook members but not channel members to access sensitive information about linked private channels including channel name, display name, and participant count through the run metadata API endpoint.
fixedosv:GHSA-wgvp-jj4w-88hf
mediumany4.1.2
Mattermost Server has low entropy for authorization data as an OAuth 2.0 Service Provider
An issue was discovered in Mattermost Server before 4.3.0, 4.2.1, and 4.1.2, when serving as an OAuth 2.0 Service Provider. There is low entropy for authorization data.
fixedosv:GHSA-w8cc-3h7q-jhc3
medium8.1.08.1.12
Mattermost's detailed error messages reveal the full file path
Mattermost versions 9.6.x <= 9.6.0, 9.5.x <= 9.5.2, 9.4.x <= 9.4.4 and 8.1.x <= 8.1.11 fail to remove detailed error messages in API requests even if the developer mode is off which allows an attacker to get information about the server such as the full path were files are stored
fixedosv:GHSA-vx97-8q8q-qgq5
mediumany8.0.0-20251121122154-b57c297c6d7
Mattermost doesn't verify that post actions invoking `/share-issue-publicly` were created by the Jira plugin
Mattermost versions 11.1.x <= 11.1.0, 11.0.x <= 11.0.5, 10.12.x <= 10.12.3, 10.11.x <= 10.11.7 fail to verify that post actions invoking /share-issue-publicly were created by the Jira plugin which allowed a malicious Mattermost user to exfiltrate Jira tickets when victim users interacted with affected posts
fixedosv:GHSA-vww6-79rv-3j4x
mediumany2.1.0
Mattermost Server allows XSS via CSRF
An issue was discovered in Mattermost Server before 2.1.0. It allows XSS via CSRF.
fixedosv:GHSA-vw57-55f8-c73q
mediumany4.0.5
Mattermost Server does not safeguard against phishing via error page links
An issue was discovered in Mattermost Server before 4.2.0, 4.1.1, and 4.0.5. It allows Phishing because an error page can have a link.
fixedosv:GHSA-vrh2-rprg-rgc6
mediumany0.0.0-20250513065225-4ae5d647fb88
Mattermost Incorrect Authorization vulnerability
Mattermost versions 10.5.x <= 10.5.5, 9.11.x <= 9.11.15, 10.8.x <= 10.8.0, 10.7.x <= 10.7.2, 10.6.x <= 10.6.5 fail to properly enforce channel member management permissions when adding participants to playbook runs. This allows authenticated users with member-level permissions to bypass system admin restrictions and add or remove users to/from private channels via the playbook run participants feature, even when the 'Manage Members' permission has been explicitly removed. This can lead to unauthorized access to sensitive channel content and allow guest users to gain channel management privileges.
fixedosv:GHSA-v8fr-vxmw-6mf6
mediumany7.1.4
Denial of service in Mattermost
A denial-of-service vulnerability in the Mattermost allows an authenticated user to crash the server via multiple requests to one of the API endpoints which could fetch a large amount of data.
fixedosv:GHSA-v42f-hq78-8c5m
mediumany2.2.0
Mattermost Server: Files may be rendered inline instead of downloaded, allowing script execution
An issue was discovered in Mattermost Server before 2.2.0. It allows XSS because it configures files to be opened in a browser window.
fixedosv:GHSA-rm24-25xm-9454
medium5.4.0-rc17.8.12
Mattermost password hash disclosure vulnerability
Mattermost fails to properly sanitize the user object when updating the username, resulting in the password hash being included in the response body. 
fixedosv:GHSA-r67m-mf7v-qp7j
mediumany0.0.0-20250520060012-d0380305ef7a
Mattermost allows unauthorized channel member management through playbook runs
Mattermost versions 10.5.x <= 10.5.5, 9.11.x <= 9.11.15, 10.8.x <= 10.8.0, 10.7.x <= 10.7.2, 10.6.x <= 10.6.5 fail to properly enforce channel member management permissions in playbook runs, allowing authenticated users without the 'Manage Channel Members' permission to add or remove users from public and private channels by manipulating playbook run participants when the run is linked to a channel.
fixedosv:GHSA-qwwm-c582-82rx
medium10.8.010.8.4
Mattermost Does Not Sanitize the Team Invite ID
Mattermost versions 10.8.x <= 10.8.3, 10.5.x <= 10.5.8, 9.11.x <= 9.11.17, 10.9.x <= 10.9.2 fail to sanitize the team invite ID in the POST /api/v4/teams/:teamId/restore endpoint which allows an team admin with no member invite privileges to get the team’s invite id.
fixedosv:GHSA-qj47-w9f2-qg44
medium10.8.010.8.4
Mattermost Fails to Validate Remote Cluster Upload Sessions
Mattermost versions 10.8.x <= 10.8.3, 10.5.x <= 10.5.8, 9.11.x <= 9.11.17, 10.9.x <= 10.9.2, 10.10.x <= 10.10.0 fail to validate upload types in remote cluster upload sessions which allows a system admin to upload non-attachment file types via shared channels that could potentially be placed in arbitrary filesystem directories.
fixedosv:GHSA-q453-638c-h4mr
mediumany2.0.1-0.20160310160916-26ad6d2c7696
Mattermost Server exposes sensitive information about team URLs via an API
An issue was discovered in Mattermost Server before 3.0.0. It allows attackers to obtain sensitive information about team URLs via an API.
fixedosv:GHSA-q3g9-hgrx-hwhx
mediumany8.0.0-20251210191531-cd17b61de41b
Mattermost fails to sanitize sensitive data in WebSocket messages
Mattermost versions 11.1.x <= 11.1.2, 10.11.x <= 10.11.9, 11.2.x <= 11.2.1 fail to sanitize sensitive data in WebSocket messages which allows authenticated users to exfiltrate password hashes and MFA secrets via profile nickname updates or email verification events. Mattermost Advisory ID: MMSA-2025-00560
fixedosv:GHSA-pp9j-pf5c-659x
medium10.8.010.8.4
Mattermost Fails to Sanitize File Names
Mattermost versions 10.8.x <= 10.8.3, 10.5.x <= 10.5.8, 10.10.x <= 10.10.0, 10.9.x <= 10.9.3 fail to sanitize file names which allows users with file upload permission to overwrite file attachment thumbnails via path traversal in file streaming APIs.
fixedosv:GHSA-pj6f-rc94-gw53
mediumany8.0.0-20260123211116-9efe617be8b8
Mattermost allows attackers to spoof permalink embeds
Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2, 10.11.x <= 10.11.10 fail to sanitize client-supplied post metadata which allows an authenticated attacker to spoof permalink embeds impersonating other users via crafted PUT requests to the post update API endpoint. Mattermost Advisory ID: MMSA-2025-00569
fixedosv:GHSA-ph22-fw5m-w2q9
medium10.11.010.11.9
Mattermost is vulnerable to DoS due to infinite re-renders on API errors
Mattermost versions 10.11.x <= 10.11.8, 11.1.x <= 11.1.1, 11.0.x <= 11.0.6 fail to prevent infinite re-renders on API errors which allows authenticated users to cause application-level DoS via triggering unbounded component re-render loops.
fixedosv:GHSA-mx8m-v8qm-xwr8
medium10.11.010.11.4
Mattermost allows system administrators to access password hashes and MFA secrets
Mattermost versions 10.11.x <= 10.11.3, 10.5.x <= 10.5.11, 10.12.x <= 10.12.0 fail to sanitize user data which allows system administrators to access password hashes and MFA secrets via the POST /api/v4/users/{user_id}/email/verify/member endpoint
fixedosv:GHSA-mqp8-pgg5-7x7m
mediumany2.2.0
Mattermost Server is vulnerable to XSS through crafted links
An issue was discovered in Mattermost Server before 2.2.0. It allows XSS via a crafted link.
fixedosv:GHSA-m78r-2x6w-qqjp
mediumany4.1.2
Mattermost Server allows attackers to create buttons that can launch API requests
An issue was discovered in Mattermost Server before 4.3.0, 4.2.1, and 4.1.2. It allows an attacker to create a button that, when pressed by a user, launches an API request.
fixedosv:GHSA-m497-hq5x-6jcv
mediumany3.10.3
Mattermost Server exposes team invite IDs through API endpoints
An issue was discovered in Mattermost Server before 4.1.0, 4.0.4, and 3.10.3. It allows attackers to discover team invite IDs via team API endpoints.
fixedosv:GHSA-jwfv-5hwq-f97r
mediumany4.1.2
Mattermost Server is vulnerable to webhook and slash command manipulation
An issue was discovered in Mattermost Server before 4.3.0, 4.2.1, and 4.1.2. An attacker could create fictive system-message posts via webhooks and slash commands, in the v3 or v4 REST API.
fixedosv:GHSA-jp57-4x34-5v94
mediumany8.0.0-20250815165020-c8d66301415d
Mattermost fails to properly restrict access to archived channel search API
Mattermost versions < 11 fail to properly restrict access to archived channel search API which allows guest users to discover archived public channels via the `/api/v4/teams/{team_id}/channels/search_archived` endpoint
fixedosv:GHSA-j6gg-r5jc-47cm
mediumany4.1.2-0.20171004201910-6be8113eb60c
Mattermost Server is vulnerable to Path Traversal when files are stored locally
An issue was discovered in Mattermost Server before 4.3.0, 4.2.1, and 4.1.2 when local storage for files is used. A System Admin can test for the existence of an arbitrary file.
fixedosv:GHSA-hjqh-j6rj-gh8q
mediumany4.3.3
Mattermost Server's OAuth 2.0 service is vulnerable to attack through Missing Authorization
An issue was discovered in Mattermost Server before 4.4.3 and 4.3.3. Attackers could reconfigure an OAuth app in some cases where Mattermost is an OAuth 2.0 service provider.
fixedosv:GHSA-hgrp-fgm8-56g8
mediumany3.1.0
Mattermost Server is vulnerable to XSS through customizable theme color-code values
An issue was discovered in Mattermost Server before 3.1.0. It allows XSS via theme color-code values.
fixedosv:GHSA-h8qw-xqm9-q66j
mediumany4.0.5
Mattermost Server exposes sensitive user status information via REST API version 4 endpoint
An issue was discovered in Mattermost Server before 4.2.0, 4.1.1, and 4.0.5. It allows attackers to obtain sensitive information (user statuses) via a REST API version 4 endpoint.
fixedosv:GHSA-h742-xx59-r9pq
medium10.4.010.4.3
Mattermost allows members with permission to convert public channels to private and convert private to public
Mattermost versions 10.4.x <= 10.4.2, 10.3.x <= 10.3.3, 9.11.x <= 9.11.8 fail to to enforce channel conversion restrictions, which allows members with permission to convert public channels to private ones to also convert private ones to public.
fixedosv:GHSA-h5v9-xw2g-7hrq
mediumany4.1.2-0.20171004201910-6be8113eb60c
Mattermost Server allows users with a session ID to revoke another users' session
An issue was discovered in Mattermost Server before 4.3.0, 4.2.1, and 4.1.2. Knowledge of a session ID allows revoking another user's session.
fixedosv:GHSA-h564-6gc2-fcc6
medium10.8.010.8.4
Mattermost has Potential Server Crash due to Unvalidated Import Data
Mattermost versions 10.8.x <= 10.8.3, 10.5.x <= 10.5.8, 9.11.x <= 9.11.17, 10.10.x <= 10.10.0, 10.9.x <= 10.9.3 fail to validate import data which allows a system admin to crash the server via the bulk import feature.
fixedosv:GHSA-h469-4fcf-p23h
mediumany3.1.0
Mattermost Server is vulnerable to XSS through lack of link relationship attributes `noreferrer` and `noopener`
An issue was discovered in Mattermost Server before 3.1.0. It allows XSS because the noreferrer and noopener protection mechanisms were not in place.
fixedosv:GHSA-h3qg-w9j5-wh3m
medium6.6.06.6.1
Uncontrolled Resource Consumption in Mattermost server
Uncontrolled resource consumption in Mattermost version 6.6.0 and earlier allows an authenticated attacker to crash the server via a crafted SVG attachment on a post.
fixedosv:GHSA-gwpf-95jc-63rv
mediumany8.0.0-20260129133647-5d787969c2d5
Mattermost fails to canonicalize IPv4-mapped IPv6 addresses before reserved IP validation
Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2, 10.11.x <= 10.11.10 fail to canonicalize IPv4-mapped IPv6 addresses before reserved IP validation which allows an attacker to perform SSRF attacks against internal services via IPv4-mapped IPv6 literals (e.g., [::ffff:127.0.0.1]).. Mattermost Advisory ID: MMSA-2026-00585
fixedosv:GHSA-gqv7-j2j8-qmwq
medium10.9.010.9.2
Mattermost Fails to Validate File Paths
Mattermost versions 10.9.x <= 10.9.1, 10.8.x <= 10.8.3, 10.5.x <= 10.5.8, 9.11.x <= 9.11.17 fail to properly validate file paths during plugin import operations which allows restricted admin users to install unauthorized custom plugins via path traversal in the import functionality, bypassing plugin signature enforcement and marketplace restrictions.
fixedosv:GHSA-gq3r-5833-5532
mediumany3.0.0
Mattermost Server exposes account details to any Team Administrator
An issue was discovered in Mattermost Server before 3.0.0. It offers superfluous APIs for a Team Administrator to view account details.
fixedosv:GHSA-g3f3-p9rc-775p
mediumany3.9.2
Mattermost Server has Insufficient Session Expiration when used as an OAuth 2.0 service provider
An issue was discovered in Mattermost Server before 4.0.0, 3.10.2, and 3.9.2, when used as an OAuth 2.0 service provider, Session invalidation was mishandled.
fixedosv:GHSA-g24c-fx4v-xg9w
mediumany8.0.0-20260105134819-cc427af41b2a
Mattermost fails to filter invite IDs based on user permissions
Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2, 10.11.x <= 10.11.10 fail to filter invite IDs based on user permissions, which allows regular users to bypass access control restrictions and register unauthorized accounts via leaked invite IDs during team creation. Mattermost Advisory ID: MMSA-2025-00565
fixedosv:GHSA-fx49-m253-27jj
medium9.11.09.11.9
Mattermost Fails to Properly Perform Viewer Role Authorization
Mattermost versions 9.11.x <= 9.11.8 fail to properly perform authorization of the Viewer role which allows an attacker with the Viewer role configured with No Access to Reporting to still view team and site statistics.
fixedosv:GHSA-fqrq-xmxj-v47x
mediumany8.0.0-20251121122154-b57c297c6d7
Mattermost doesn't validate user channel membership when attaching Mattermost posts as comments to Jira issues
Mattermost versions 11.1.x <= 11.1.0, 11.0.x <= 11.0.5, 10.12.x <= 10.12.3, 10.11.x <= 10.11.7 fails to validate user channel membership when attaching Mattermost posts as comments to Jira issues, which allows an authenticated attacker with access to the Jira plugin to read post content and attachments from channels they do not have access to.
fixedosv:GHSA-fmqf-pmcm-8cx9
medium11.4.0-rc111.4.1
Mattermost allows attackers to take over arbitrary user accounts via overly permissive substring matching flaw
Mattermost versions 11.4.x <= 11.4.0, 11.3.x <= 11.3.1, 11.2.x <= 11.2.3, 10.11.x <= 10.11.11 fail to properly validate user identity in the OpenID {{IsSameUser()}} comparison logic, which allows an attacker to take over arbitrary user accounts via an overly permissive substring matching flaw in the user discovery flow. Mattermost Advisory ID: MMSA-2026-00590
fixedosv:GHSA-fg35-5rf6-qg3g
mediumany3.2.0
Mattermost Server is vulnerable to Uncontrolled Resource Consumption
An issue was discovered in Mattermost Server before 3.2.0. It allowed crafted posts that could cause a web browser to hang.
fixedosv:GHSA-ffcc-qr2v-3qmv
medium10.11.010.11.4
Mattermost allows an attacker to edit arbitrary posts via a crafted MSTeams plugin OAuth redirect URL
Mattermost versions 10.11.x <= 10.11.3, 10.5.x <= 10.5.11, 10.12.x <= 10.12.0 fail to validate the relationship between the post being updated and the MSTeams plugin OAuth flow which allows an attacker to edit arbitrary posts via a crafted MSTeams plugin OAuth redirect URL.
fixedosv:GHSA-ff85-qw3h-g9vp
mediumany4.0.5
Mattermost Server mishandles redirect denial action
An issue was discovered in Mattermost Server before 4.2.0, 4.1.1, and 4.0.5, when used as an OAuth 2.0 service provider. It mishandles a deny action for a redirection.
fixedosv:GHSA-f7c3-7vp3-44p6
mediumany8.0.0-20260107142155-0481bd1fb045
Mattermost fails to properly enforce read permissions in search API endpoints
Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2, 10.11.x <= 10.11.10 fail to properly enforce read permissions in search API endpoints which allows guest users without read permissions to access posts and files in channels via search API requests. Mattermost Advisory ID: MMSA-2025-00554
fixedosv:GHSA-cwfj-642j-gfh4
mediumany3.5.1
Mattermost Server vulnerable to Cross-site Scripting through file preview feature
An issue was discovered in Mattermost Server before 3.5.1. XSS can occur via file preview.
fixedosv:GHSA-cffj-7w5c-jqjh
mediumany3.10.3
Mattermost Server exposes private team invite ID
An issue was discovered in Mattermost Server before 4.1.0, 4.0.4, and 3.10.3. It allows attackers to discover a team invite ID by requesting a JSON document.
fixedosv:GHSA-c253-8hr4-r8v9
mediumany4.1.2
Mattermost Server is vulnerable to XSS attacks against an OAuth 2.0 allow/deny page
An issue was discovered in Mattermost Server before 4.3.0, 4.2.1, and 4.1.2. XSS attacks could occur against an OAuth 2.0 allow/deny page.
fixedosv:GHSA-9x8x-w6g5-hx4w
mediumany3.0.0
Mattermost Server exposes sensitive information via its System Console UI
An issue was discovered in Mattermost Server before 3.0.0. It potentially allows attackers to obtain sensitive information (credential fields within config.json) via the System Console UI.
fixedosv:GHSA-9w4v-9c99-hv7r
mediumany4.1.2-0.20171004201910-6be8113eb60c
Mattermost Server does not prevent System Admin from arbitrary file creation
An issue was discovered in Mattermost Server before 4.3.0, 4.2.1, and 4.1.2 when local storage for files is used. A System Admin can create arbitrary files.
fixedosv:GHSA-9rr5-q43r-ccv4
medium11.2.011.2.2
Mattermost doesn't validate user permissions when creating Jira issues from Mattermost posts
Mattermost versions 11.1.x <= 11.1.2, 10.11.x <= 10.11.9, 11.2.x <= 11.2.1 fail to validate user permissions when creating Jira issues from Mattermost posts, which allows an authenticated attacker with access to the Jira plugin to read post content and attachments from channels they do not have access to via the /create-issue API endpoint by providing the post ID of an inaccessible post.. Mattermost Advisory ID: MMSA-2025-00550
fixedosv:GHSA-9pj7-jh2r-87g8
medium10.8.010.8.4
Mattermost makes Use of Weak Hash
Mattermost versions 10.8.x <= 10.8.3, 10.5.x <= 10.5.8, 9.11.x <= 9.11.17, 10.10.x <= 10.10.1, 10.9.x <= 10.9.3 fail to properly validate cache keys for link metadata which allows authenticated users to access unauthorized posts and poison link previews via hash collision attacks on FNV-1 hashing.
fixedosv:GHSA-9p92-x77w-9fw2
mediumany3.0.0
Mattermost Server is vulnerable to XSS via a Legal or Support setting
An issue was discovered in Mattermost Server before 3.0.0. It allows XSS via a Legal or Support setting.
fixedosv:GHSA-9jrx-fgrm-96qh
medium3.3.07.1.6
Mattermost fails to properly authentication inviter's permissions to private channel
When processing an email invite to a private channel on a team, Mattermost fails to validate the inviter's permission to that channel, allowing an attacker to invite themselves to a private channel. [Issue Identifier](https://mattermost.com/security-updates/): MMSA-2023-00137
fixedosv:GHSA-9hj7-v56g-rhf6
mediumany4.0.5
Mattermost Server is vulnerable to DoS through maliciously crafted posts
An issue was discovered in Mattermost Server before 4.2.0, 4.1.1, and 4.0.5. It allows crafted posts that potentially cause a web browser to hang.
fixedosv:GHSA-9589-mq83-f749
mediumany4.1.2-0.20171004201910-6be8113eb60
Mattermost Server is vulnerable to Directory Traversal by System Admins
An issue was discovered in Mattermost Server before 4.3.0, 4.2.1, and 4.1.2 when local storage for files is used. A System Admin can achieve directory traversal.
fixedosv:GHSA-8qg8-c7mw-6fj7
mediumany3.9.2
Mattermost Server vulnerable to XSS via an uploaded file
An issue was discovered in Mattermost Server before 4.0.0, 3.10.2, and 3.9.2. It allows XSS via an uploaded file.
fixedosv:GHSA-8pff-p3gx-w4jf
medium3.3.07.1.6
Mattermost vulnerable to information disclosure
When running in a High Availability configuration, Mattermost fails to sanitize some of the `user_updated` and` post_deleted` events broadcast to all users, leading to disclosure of sensitive information to some of the users with currently connected Websocket clients. [Issue Identifier](https://mattermost.com/security-updates/): MMSA-2023-00138
fixedosv:GHSA-8jhh-3jf2-pfwr
medium8.1.08.1.12
Mattermost crashes web clients via a malformed custom status
Mattermost versions 9.6.0, 9.5.x before 9.5.3, 9.4.x before 9.4.5, and 8.1.x before 8.1.12 fail to handle JSON parsing errors in custom status values, which allows an authenticated attacker to crash other users' web clients via a malformed custom status.
fixedosv:GHSA-8f99-g2pj-x8w3
mediumany4.0.5
Mattermost Server is vulnerable to XSS through display name field
An issue was discovered in Mattermost Server before 4.2.0, 4.1.1, and 4.0.5. Display names allow XSS.
fixedosv:GHSA-887v-xh2x-47cm
mediumany3.2.0
Mattermost Server is vulnerable to Code Injection through its LDAP fields
An issue was discovered in Mattermost Server before 3.2.0. Attackers could read LDAP fields via injection.
fixedosv:GHSA-7vmw-6c7h-rrrv
medium10.5.010.5.7
Mattermost Missing Authentication for Critical Function
Mattermost versions 10.5.x <= 10.5.6, 10.8.x <= 10.8.1, 10.7.x <= 10.7.3, 9.11.x <= 9.11.16 fail to verify authorization when retrieving cached posts by PendingPostID which allows an authenticated user to read posts in private channels they don't have access to via guessing the PendingPostID of recently created posts.
fixedosv:GHSA-7h34-9chr-58qh
mediumany8.0.0-20250822090405-e8c7e7d0252b
Mattermost has a Missing Authorization vulnerability
Mattermost versions 10.5.x <= 10.5.10, 10.11.x <= 10.11.2 fail to properly validate guest user permissions when accessing channel information which allows guest users to discover active public channels and their metadata via the `/api/v4/teams/{team_id}/channels/ids` endpoint
fixedosv:GHSA-7cr3-38jm-6p45
mediumany8.0.0-20260113182106-a18b80ba4c32
Mattermost allows a removed team member to enumerate all public channels within a private team
Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2, 10.11.x <= 10.11.10 fail to properly validate team membership when searching channels which allows a removed team member to enumerate all public channels within a private team via the channel search API endpoint. Mattermost Advisory ID: MMSA-2025-00568
fixedosv:GHSA-679f-wmrg-qf57
medium4.1.04.1.1
Mattermost Server allows attackers to log sensitive information via DEBUG REST API logging endpoint
An issue was discovered in Mattermost Server before 4.2.0, 4.1.1, and 4.0.5. It allows attackers to add DEBUG lines to the logs via a REST API version 3 logging endpoint.
fixedosv:GHSA-63wg-qmrv-7q66
medium6.0.07.1.6
Mattermost vulnerable to cross-site scripting (XSS)
Boards in Mattermost allows an attacker to upload a malicious SVG image file as an attachment to a card and share it using a direct link to the file. [Issue Identifier](https://mattermost.com/security-updates/): MMSA-2023-00139
fixedosv:GHSA-63f2-6959-2pxj
mediumany2.2.0
Mattermost Server exposes information stored by a web browser
An issue was discovered in Mattermost Server before 2.2.0. It allows unintended access to information stored by a web browser.
fixedosv:GHSA-5q37-9874-qxcw
mediumany8.0.0-20260130144323-5bb5261c72fa
Mattermost fails to use consistent error responses when handling the /mute command
Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2, 10.11.x <= 10.11.10 fail to use consistent error responses when handling the /mute command which allows an authenticated team member to enumerate private channels they are not authorized to know about via differing error messages for nonexistent versus private channels. Mattermost Advisory ID: MMSA-2026-00588
fixedosv:GHSA-5mr9-crcg-8wh2
mediumany7.1.4
Denial of service in Mattermost
A denial-of-service vulnerability in Mattermost allows an authenticated user to crash the server via multiple large autoresponder messages.
fixedosv:GHSA-5jph-wrq7-v9hf
mediumany3.6.5
Mattermost Server does not restrict SAML certificate path for System Administrators
An issue was discovered in Mattermost Server before 3.7.3 and 3.6.5. A System Administrator can place a SAML certificate at an arbitrary pathname.
fixedosv:GHSA-5ghq-28r7-qwfj
mediumany8.0.0-20251209134645-761e56bb11cc
Mattermost fails to properly validate team membership when processing channel mentions
Mattermost versions 11.1.x <= 11.1.2, 10.11.x <= 10.11.9, 11.2.x <= 11.2.1 fail to properly validate team membership when processing channel mentions which allows authenticated users to determine the existence of teams and their URL names via posting channel shortlinks and observing the channel_mentions property in the API response. Mattermost Advisory ID: MMSA-2025-00563
fixedosv:GHSA-57cc-2pf4-mhmx
mediumany8.0.0-20250414112942-77892234944b
Mattermost allows authenticated administrator to execute LDAP search filter injection
Mattermost versions 10.7.x <= 10.7.1, 10.6.x <= 10.6.3, 10.5.x <= 10.5.4, 9.11.x <= 9.11.13 fail to properly validate LDAP group ID attributes, allowing an authenticated administrator with PermissionSysconsoleWriteUserManagementGroups permission to execute LDAP search filter injection via the PUT /api/v4/ldap/groups/{remote_id}/link API when objectGUID is configured as the Group ID Attribute.
fixedosv:GHSA-4r67-4x4p-fprg
mediumany8.0.0-20251015091448-abbf01b9db45
Mattermost fails to sanitize team email addresses
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint
fixedosv:GHSA-4g87-9x45-cx2h
mediumany4.1.2
Mattermost Server is vulnerable to XSS through author_link field in Slack attachments
An issue was discovered in Mattermost Server before 4.3.0, 4.2.1, and 4.1.2. XSS could occur via the author_link field of a Slack attachment.
fixedosv:GHSA-498j-wxww-j897
medium11.4.0-rc111.4.1
Mattermost doesn't set permissions on downloaded bulk export
Mattermost versions 11.4.x <= 11.4.0, 11.3.x <= 11.3.1, 11.2.x <= 11.2.3, 10.11.x <= 10.11.11 fail to set permissions on downloaded bulk export which allows other local users on the server to be able to read contents of the bulk export. Mattermost Advisory ID: MMSA-2026-00593.
fixedosv:GHSA-4765-v66x-rqx7
mediumany0.0.0-20250520060012-d0380305ef7a
Mattermost allows an unauthorized Guest user access to Playbook
Mattermost versions 10.5.x <= 10.5.5, 9.11.x <= 9.11.15, 10.8.x <= 10.8.0, 10.7.x <= 10.7.2, 10.6.x <= 10.6.5 fail to properly retrieve requestorInfo from playbooks handler for guest users which allows an attacker access to the playbook run.
fixedosv:GHSA-4578-6gjh-f2jm
mediumany8.0.0-20260115183946-38b413a27604
Mattermost fails to bound memory allocation when processing PSD image files
Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2, 10.11.x <= 10.11.10 fail to bound memory allocation when processing PSD image files which allows an authenticated attacker to cause server memory exhaustion and denial of service via uploading a specially crafted PSD file. Mattermost Advisory ID: MMSA-2026-00572
fixedosv:GHSA-44mv-jq72-gj49
mediumany3.0.2
Mattermost Server's Session ID and Session Token are potentially compromised
An issue was discovered in Mattermost Server before 3.0.2. The purposes of a session ID and a Session Token were mishandled.
fixedosv:GHSA-43m6-wvc8-2m7j
mediumany3.9.2-0.20170714014920-312269ad0bd1
Mattermost Server vulnerable to XSS through channel headers
An issue was discovered in Mattermost Server before 4.0.0, 3.10.2, and 3.9.2. XSS could occur via a channel header.
fixedosv:GHSA-42x9-rr3c-gr59
medium6.3.07.1.6
Mattermost vulnerable to information disclosure
Mattermost allows an attacker to request a preview of an existing message when creating a new message via the createPost API call, disclosing the contents of the linked message.
fixedosv:GHSA-3wq5-3f56-v5xc
mediumany8.0.0-20250729073403-517ae758cd02
Mattermost Missing Authorization vulnerability
Mattermost versions 10.10.x <= 10.10.1 fail to properly sanitize user data during shared channel membership synchronization, which allows malicious or compromised remote clusters to access sensitive user information via unsanitized user objects. This vulnerability affects Mattermost Server instances with shared channels enabled.
fixedosv:GHSA-3vcm-c42p-3hhf
mediumany8.0.0-20260127062706-c6b205f0d770
Mattermost fails to preserve the redacted state of burn-on-read posts during deletion
Mattermost versions 11.3.x <= 11.3.0 fail to preserve the redacted state of burn-on-read posts during deletion which allows channel members to access unrevealed burn-on-read message contents via the WebSocket post deletion event. Mattermost Advisory ID: MMSA-2026-00579
fixedosv:GHSA-3rhr-jr63-hwq5
mediumany8.0.0-20250822083415-01b95392a450
Mattermost has a Missing Authorization vulnerability
Mattermost versions 10.10.x <= 10.10.2, 10.5.x <= 10.5.10, 10.11.x <= 10.11.2 fail to validate email ownership during Slack import process which allows attackers to create verified user accounts with arbitrary email domains via malicious Slack import data to bypass email-based team access restrictions.
fixedosv:GHSA-3q4q-wqm6-hvf3
mediumany8.0.0-20251212052346-61651b0df7ea
Mattermost fails to properly validate login method restrictions
Mattermost versions 11.1.x <= 11.1.2, 10.11.x <= 10.11.9, 11.2.x <= 11.2.1 fail to properly validate login method restrictions which allows an authenticated user to bypass SSO-only login requirements via userID-based authentication. Mattermost Advisory ID: MMSA-2025-00548
fixedosv:GHSA-3c9r-7f29-qp32
mediumany4.1.2
Mattermost Server exposes team creator's e-mail address to other members
An issue was discovered in Mattermost Server before 4.3.0, 4.2.1, and 4.1.2. It discloses the team creator's e-mail address to members.
fixedosv:GHSA-35c4-5qfp-wxj6
mediumany8.0.0-20260127165411-fe3052073dc6
Mattermost fails to limit the size of responses from integration action endpoints
Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2, 10.11.x <= 10.11.10 Mattermost fails to limit the size of responses from integration action endpoints, which allows an authenticated attacker to cause server memory exhaustion and denial of service via a malicious integration server that returns an arbitrarily large response when a user clicks an interactive message button. Mattermost Advisory ID: MMSA-2026-00571
fixedosv:GHSA-34g8-9fpp-46ch
medium10.5.010.5.2
Mattermost Fails to Restrict Certain Operations on System Admins
Mattermost versions 10.5.x <= 10.5.1, 10.4.x <= 10.4.3, 9.11.x <= 9.11.9 fail to restrict certain operations on system admins to only other system admins, which allows delegated granular administration users with the "Edit Other Users" permission to perform unauthorized modifications to system administrators via improper permission validation.
fixedosv:GHSA-322v-vh2g-qvpv
mediumany8.0.0-20260129181235-1346cf529aef
Mattermost fails to properly validate User-Agent header tokens
Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2, 10.11.x <= 10.11.10 fail to properly validate User-Agent header tokens which allows an authenticated attacker to cause a request panic via a specially crafted User-Agent header. Mattermost Advisory ID: MMSA-2026-00586
fixedosv:GHSA-2v3w-6g35-5f9v
mediumany3.0.0
Mattermost Server allows XSS via redirect URL
An issue was discovered in Mattermost Server before 3.0.0. It allows XSS via a redirect URL.
fixedosv:GHSA-2j9c-76pp-xc5q
medium11.4.0-rc111.4.1
Mattermost doesn't rate limit login requests, allowing DoS
Mattermost versions 11.4.x <= 11.4.0, 11.3.x <= 11.3.1, 11.2.x <= 11.2.3, 10.11.x <= 10.11.11 fail to rate limit login requests which allows unauthenticated remote attackers to cause denial of service (server crash and restart) via HTTP/2 single packet attack with 100+ parallel login requests.. Mattermost Advisory ID: MMSA-2025-00566
fixedosv:GHSA-247x-7qw8-fp98
lowany8.0.0-20250728063359-38208b8f065f
Mattermost has an Observable Timing Discrepancy vulnerability
Mattermost versions 10.5.x <= 10.5.10, 10.11.x <= 10.11.2 fail to use constant-time comparison for sensitive string comparisons which allows attackers to exploit timing oracles to perform byte-by-byte brute force attacks via response time analysis on Cloud API keys and OAuth client secrets.
fixedosv:GHSA-xr3w-rmvj-f6m7
lowany11.0.0-alpha.1
Mattermost allows regular users to access archived channel content and files
Mattermost versions < 11.0 fail to properly enforce the "Allow users to view archived channels" setting which allows regular users to access archived channel content and files via the "Open in Channel" functionality from followed threads
fixedosv:GHSA-x3hx-ch7p-8xgg
low9.5.09.5.7
Mattermost did not properly restrict channel creation
Mattermost versions 9.9.x <= 9.9.0, 9.5.x <= 9.5.6 fail to properly restrict channel creation which allows a malicious remote to create arbitrary channels, when shared channels were enabled.
fixedosv:GHSA-vvpg-55p7-5h8w
low10.5.010.5.10
Mattermost Server SSRF Vulnerability via the Agents Plugin
Mattermost Server versions 10.5.x <= 10.5.9 utilizing the Agents plugin fail to reject empty request bodies which allows users to trick users into clicking malicious links via post actions
fixedosv:GHSA-vqwh-5jhh-vc9p
lowany8.0.0-20260127144908-ced9a56e3988
Mattermost fails to validate user's authentication method when processing account auth type switch
Mattermost versions 10.11.x <= 10.11.10 fail to validate user's authentication method when processing account auth type switch which allows an authenticated attacker to change account password without confirmation via falsely claiming a different auth provider.. Mattermost Advisory ID: MMSA-2026-00583
fixedosv:GHSA-rv67-7w2g-7976
lowany0.0.0-20240209181221-674f549daf0e
Mattermost Server Resource Exhaustion
Resource Exhaustion in Mattermost Server versions 8.1.x before 8.1.10 fails to limit the size of the payload that can be read and parsed allowing an attacker to send a very large email payload and crash the server.
fixedosv:GHSA-qqc8-rv37-79q5
low10.5.010.5.9
Mattermost Lack of Access Control Validation
Mattermost versions 10.5.x <= 10.5.8 fail to validate access controls at time of access which allows user to read a thread via AI posts
fixedosv:GHSA-pwvr-grqg-7vp2
low8.1.08.1.12
Mattermost fails to limit the size of a request path
Mattermost versions 8.1.x <= 8.1.10, 9.6.x <= 9.6.0, 9.5.x <= 9.5.2 and 8.1.x <= 8.1.11 fail to limit the size of a request path that includes user inputs which allows an attacker to cause excessive resource consumption, possibly leading to a DoS via sending large request paths
fixedosv:GHSA-p2wq-4ggp-45f3
low10.11.010.11.4
Mattermost Incorrect Authorization vulnerability
Mattermost versions 10.11.x <= 10.11.3, 10.5.x <= 10.5.11 fail to properly validate team membership permissions in the Add Channel Member API, which allows users from one team to access user metadata and channel membership information from other teams via the API endpoint.
fixedosv:GHSA-mqcj-8c2g-h97q
lowany3.0.0
Mattermost Server allows System Admin to modify LDAP account names and email addresses
An issue was discovered in Mattermost Server before 3.0.0. It has a superfluous API in which the System Admin can change the account name and e-mail address of an LDAP account.
fixedosv:GHSA-mj8v-773w-5qhj
lowany8.0.0-20250422131222-701ddc896a10
Mattermost allows guest users to view information about public teams they are not members of
Mattermost versions 10.5.x <= 10.5.4, 9.11.x <= 9.11.13 fail to properly restrict API access to team information, allowing guest users to bypass permissions and view information about public teams they are not members of via a direct API call to /api/v4/teams/{team_id}.
fixedosv:GHSA-jwhw-xf5v-qgxc
lowany8.0.0-202508080704-39bd251fe4f600
Mattermost Open Redirect vulnerability
Mattermost versions 10.5.x <= 10.5.9 fail to properly validate redirect URLs which allows attackers to redirect users to malicious sites via crafted OAuth login URLs.
fixedosv:GHSA-hm95-jx66-g2gh
lowany0.0.0-20250716054606-3f3e3becfe1d
Mattermost boards plugin fails to restrict download access to files
Mattermost versions 10.5.x <= 10.5.8, 9.11.x <= 9.11.17 fail to properly validate access controls which allows any authenticated user to download sensitive files via board file download endpoint using UUID enumeration
fixedosv:GHSA-f72g-52v7-mg3p
lowany8.0.0-20251215190648-6404ab29acc0
Mattermost fails to enforce invite permissions when updating team settings
Mattermost versions 10.11.x <= 10.11.9 fail to enforce invite permissions when updating team settings, which allows team administrators without proper permissions to bypass restrictions and add users to their team via API requests. Mattermost Advisory ID: MMSA-2025-00561
fixedosv:GHSA-cgjg-p2m2-qm4p
low10.11.010.11.9
Mattermost is vulnerable to CPU exhaustion via crafted HTTP request
Mattermost versions 10.11.x <= 10.11.8 fail to validate input size before processing hashtags which allows an authenticated attacker to exhaust CPU resources via a single HTTP request containing a post with thousands space-separated tokens.
fixedosv:GHSA-9r42-rhw3-2222
low10.11.010.11.4
Mattermost allows other users to determine when users had read channels via channel member objects
Mattermost versions 10.11.x <= 10.11.3, and 10.5.x <= 10.5.11 fail to enforce access permissions on the Agents plugin which allows other users to determine when users had read channels via channel member objects.
fixedosv:GHSA-9hh7-6558-qfp2
low9.6.0-rc19.6.1
Mattermost fails to fully validate role changes
Mattermost versions 9.6.0, 9.5.x before 9.5.3, and 8.1.x before 8.1.12 fail to fully validate role changes which allows an attacker authenticated as team admin to demote users to guest via crafted HTTP requests.
fixedosv:GHSA-5qx9-9ffj-5r8f
low9.5.09.5.3
Mattermost allows team admins to promote guests to team admins
Mattermost versions 9.6.0, 9.5.x before 9.5.3, and 8.1.x before 8.1.12 fail to fully validate role changes, which allows an attacker authenticated as a team admin to promote guests to team admins via crafted HTTP requests.
fixedosv:GHSA-5fh7-7mw7-mmx5
low10.5.010.5.8
Mattermost has Insufficiently Protected Credentials
Mattermost versions 10.5.x <= 10.5.7, 9.11.x <= 9.11.16 fail to negotiate a new token when accepting the invite which allows a user that intercepts both invite and password to send synchronization payloads to the server that originally created the invite via the REST API.
fixedosv:GHSA-4fwj-8595-wp25
low10.5.010.5.9
Mattermost Fails to Properly Validate Team Role Modification
Mattermost versions 10.5.x <= 10.5.8, 9.11.x <= 9.11.17 fail to properly validate authorization for team scheme role modifications which allows Team Admins to demote Team Members to Guests via the PUT /api/v4/teams/team-id/members/user-id/schemeRoles API endpoint.
fixedosv:GHSA-4276-cm8c-788h
lowany8.0.0-20250820115038-ff30b84049f0
Mattermost has an Incorrect Authorization vulnerability
Mattermost versions 10.5.x <= 10.5.10, 10.11.x <= 10.11.2 fail to properly validate guest user permissions when adding channel members which allows guest users to add any team members to their private channels via the `/api/v4/channels/{channel_id}/members` endpoint
fixedosv:GHSA-424h-xj87-m937
low10.11.010.11.10
Mattermost doesn't properly validate channel membership at the time of data retrieval
Mattermost versions 10.11.x <= 10.11.9 fail to properly validate channel membership at the time of data retrieval which allows a deactivated user to learn team names they should not have access to via a race condition in the /common_teams API endpoint.. Mattermost Advisory ID: MMSA-2025-00549
fixedosv:GHSA-2xf7-hmf6-p64j
criticalany4.1.2
Mattermost Server is vulnerable to SQL Injection when executing multiple POST requests
An issue was discovered in Mattermost Server before 4.3.0, 4.2.1, and 4.1.2. It allows SQL injection during the fetching of multiple posts.
fixedosv:GHSA-v2vm-hq26-5jv6
criticalany0.0.0-20250519205859-65aec10162f6
Mattermost allows authenticated users to write files to arbitrary locations
Mattermost versions 10.5.x <= 10.5.5, 9.11.x <= 9.11.15, 10.8.x <= 10.8.0, 10.7.x <= 10.7.2, 10.6.x <= 10.6.5 fail to sanitize filenames in the archive extractor which allows authenticated users to write files to arbitrary locations on the filesystem via uploading archives with path traversal sequences in filenames, potentially leading to remote code execution. The vulnerability impacts instances where file uploads and document search by content is enabled (FileSettings.EnableFileAttachments = true and FileSettings.ExtractContent = true). These configuration settings are enabled by default.
fixedosv:GHSA-qh58-9v3j-wcjc
criticalany8.0.0-20251022210333-acda1fb5dd46
Mattermost fails to to verify the token used during code exchange
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
fixedosv:GHSA-mp6x-97xj-9x62
criticalany3.6.7-rc1
Mattermost Server has X.509 Improper Certificate Validation
An issue was discovered in Mattermost Server before 3.8.2, 3.7.5, and 3.6.7. The X.509 certificate validation can be skipped for a TLS-based e-mail server.
fixedosv:GHSA-m462-mqw4-2c8m
criticalany3.6.7-0.20170420152529-0968e4079e0a
Mattermost Server server restarts may provide attackers with API access
An issue was discovered in Mattermost Server before 3.8.2, 3.7.5, and 3.6.7. After a restart of a server, an attacker might suddenly gain API Endpoint access.
fixedosv:GHSA-hxxj-8phw-74vw
criticalany4.1.2
Mattermost Server allows attackers to gain privileges by accessing unintended API endpoints with users' credentials
An issue was discovered in Mattermost Server before 4.3.0, 4.2.1, and 4.1.2. It allows attackers to gain privileges by accessing unintended API endpoints on a user's behalf.
fixedosv:GHSA-g78f-6xq7-rrhq
criticalany3.10.3
Mattermost Server is vulnerable CSV Injection
An issue was discovered in Mattermost Server before 4.0.4 and 3.10.3. It allows CSV injection via a compliance report.
fixedosv:GHSA-8q4v-35v6-g8wr
criticalany4.1.2
Mattermost Server exposes OAuth personal access tokens to attackers
An issue was discovered in Mattermost Server before 4.3.0, 4.2.1, and 4.1.2. It allows attackers to gain privileges by using a registered OAuth application with personal access tokens.
fixedosv:GHSA-876j-jfqf-m7j7
criticalany8.0.0-20251028000919-d3ed703dc833
Mattermost fails to properly validate OAuth state tokens during OpenID Connect authentication
Mattermost versions 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12, 11.0.x <= 11.0.3 fail to properly validate OAuth state tokens during OpenID Connect authentication which allows an authenticated attacker with team creation privileges to take over a user account via manipulation of authentication data during the OAuth completion flow. This requires email verification to be disabled (default: disabled), OAuth/OpenID Connect to be enabled, and the attacker to control two users in the SSO system with one of them never having logged into Mattermost.
fixedosv:GHSA-3x39-62h4-f8j6
criticalany3.9.1-rc1
Mattermost Server password reset email requests can be sent to attacker-provided email addresses
An issue was discovered in Mattermost Server before 4.0.0, 3.10.1, and 3.9.1. A password reset request was sometimes sent to an attacker-provided e-mail address.
fixedosv:GHSA-34cx-hvm4-vx7j
API access

Get this data programmatically \u2014 free, no authentication.

curl https://depscope.dev/api/bugs/go/github.com/mattermost/mattermost-server
github.com/mattermost/mattermost-server bugs — known issues per version | DepScope | DepScope