github.com/mattermost/mattermost-server

govv11.6.1+incompatible

Mattermost is an open source platform for secure collaboration across the entire software development lifecycle..

License Apache-2.0permissive917 versions1198 maintainers0 deps36,306 weekly dl
mattermost/mattermost-server
63
/ 100
Health
update required

github.com/mattermost/[email protected]+incompatible has vulnerabilities — update to latest

Update to >= 8.0.0-20260127144908-ced9a56e3988 to fix known vulnerabilities

  • 4 high severity vulnerabilities
Health breakdown0 – 100
25/25
maintenance
10/20
popularity
0/25
security
15/15
maturity
13/15
community
Vulnerabilities
134
4 high22 medium108 low
Advisories (134)
SeverityIDSummaryFixed in
mediumCVE-2025-32093Mattermost Fails to Restrict Certain Operations on System Admins8.0.0-20250227102013-aa4623a93199
mediumCVE-2026-0999Mattermost fails to properly validate login method restrictions5.3.2-0.20251212052346-61651b0df7ea
mediumBIT-mattermost-2023-1777Mattermost vulnerable to information disclosure1.4.1-0.20230301145909-10be118d99a5
lowCVE-2025-53971Mattermost Fails to Properly Validate Team Role Modification8.0.0-20250721095846-c602a4a78e1f
mediumCVE-2026-3113Mattermost doesn't set permissions on downloaded bulk export8.0.0-20260217110922-b7d4a1f1f59b
lowCVE-2025-6227Mattermost has Insufficiently Protected Credentials8.0.0-20250612074655-8f8612c63783
mediumCVE-2025-14350Mattermost fails to properly validate team membership when processing channel mentions5.3.2-0.20251209134645-761e56bb11cc
highCVE-2025-9072Mattermost Open Redirect vulnerability8.0.0-20250731063404-9eebaadf8f72
mediumCVE-2025-6226Mattermost Missing Authentication for Critical Function8.0.0-20250520130510-fa40a8c5d47f
lowCVE-2025-55074Mattermost allows other users to determine when users had read channels via channel member objects8.0.0-20250905150616-ba86dfc5876b6
mediumCVE-2025-9078Mattermost makes Use of Weak Hash8.0.0-20250718075842-cd87e5c87737
lowCVE-2025-14573Mattermost fails to enforce invite permissions when updating team settings5.3.2-0.20251215190648-6404ab29acc0
mediumCVE-2025-55073Mattermost allows an attacker to edit arbitrary posts via a crafted MSTeams plugin OAuth redirect URL8.0.0-20250929212932-a41db04d2746
mediumCVE-2026-27656Mattermost allows attackers to take over arbitrary user accounts via overly permissive substring matching flaw8.0.0-20260217110922-b7d4a1f1f59b
mediumCVE-2025-36530Mattermost Fails to Validate File Paths8.0.0-20250619095651-9dd0b3943e55
mediumBIT-mattermost-2025-27933Mattermost allows members with permission to convert public channels to private and convert private to public8.0.0-20250218135018-e644e3c8e393
mediumCVE-2025-11776Mattermost fails to properly restrict access to archived channel search API5.3.2-0.20250815165020-c8d66301415d
highCVE-2017-18912Mattermost Server allows an attacker to specify a full pathname of a log file3.7.4-0.20170404171331-0b5c0794fdcb
lowCVE-2025-11777Mattermost Incorrect Authorization vulnerability5.3.2-0.20250905150616-ba86dfc5876b
mediumCVE-2025-11794Mattermost allows system administrators to access password hashes and MFA secrets8.0.0-20250929212932-a41db04d2746
... and 114 more
Threat intelligence
1 likely exploited (EPSS ≥ 0.5)
Threat tier per vulnerability derived from CISA KEV catalog + FIRST.org EPSS scores.

Health History

Dependency Tree

License Audit

API access

Get this data programmatically — free, no authentication.

curl https://depscope.dev/api/check/go/github.com/mattermost/mattermost-server

Last updated · 2026-04-17T17:42:10Z

github.com/mattermost/mattermost-server — Health Score 63/100 | DepScope | DepScope