Changeflow GovPing Data Privacy & Cybersecurity Mattermost Vulnerabilities: Remote Attack Possible
Priority review Notice Added Final

Mattermost Vulnerabilities: Remote Attack Possible

Favicon for wid.cert-bund.de CERT-Bund Security Advisories
Published March 16th, 2026
Detected March 17th, 2026
Email

Summary

CERT-Bund has issued a security advisory regarding multiple vulnerabilities in Mattermost Server versions prior to 11.4.0, 11.3.1, 11.2.3, 10.11.11, 11.6.0, 10.11.13, 11.5.1, 11.4.3, and 10.11.13. These vulnerabilities have a CVSS base score of 7.3 and allow for remote attacks.

What changed

CERT-Bund has released Security Advisory WID-SEC-2026-0745 detailing multiple vulnerabilities in various versions of Mattermost Server. The advisory indicates a CVSS base score of 7.3 (high) and a temporal score of 6.4 (medium), with the possibility of remote attacks. Affected versions include Mattermost Server prior to 11.4.0, 11.3.1, 11.2.3, 10.11.11, 11.6.0, 10.11.13, 11.5.1, 11.4.3, and 10.11.13, impacting Linux, UNIX, and Windows operating systems.

Organizations using affected Mattermost Server versions should prioritize updating to a patched version to mitigate the risk of security bypass and unspecified impacts. While specific mitigation steps beyond updating are not detailed, prompt patching is the recommended course of action to prevent exploitation by attackers. Failure to update may expose sensitive communication data and system integrity to compromise.

What to do next

  1. Update Mattermost Server to a version that addresses the identified vulnerabilities.

Source document (simplified)

[WID-SEC-2026-0745] Mattermost: Mehrere Schwachstellen CVSS Base Score 7.3 (hoch) CVSS Temporal Score 6.4 (mittel) Remoteangriff ja Datum 16.03.2026 Stand 17.03.2026 Mitigation ja

Betroffene Systeme

Betriebssystem

  • Linux
  • Sonstiges
  • UNIX
  • Windows

Produktbeschreibung

Mattermost ist ein webbasierter Instant-Messaging-Dienst.

Produkte

16.03.2026
- Mattermost Mattermost Server <11.4.0

  • Mattermost Mattermost Server <11.3.1

  • Mattermost Mattermost Server <11.2.3

  • Mattermost Mattermost Server <10.11.11

  • Mattermost Mattermost Server <11.6.0

  • Mattermost Mattermost Server <10.11.13

  • Mattermost Mattermost Server <11.5.1

  • Mattermost Mattermost Server <11.4.3

  • Mattermost Mattermost Server <11.3.3

Angriff

Angriff

Ein Angreifer kann mehrere Schwachstellen in Mattermost ausnutzen, um Sicherheitsvorkehrungen zu umgehen, und um nicht näher spezifizierte Auswirkungen zu verursachen. CVE Informationen Versionshistorie Feedback zum Advisory geben

Source

Analysis generated by AI. Source diff and links are from the original.

Classification

Agency
CERT-Bund
Published
March 16th, 2026
Instrument
Notice
Legal weight
Non-binding
Stage
Final
Change scope
Substantive

Who this affects

Applies to
Technology companies
Geographic scope
de

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Topics
Software Vulnerabilities Instant Messaging

Get Data Privacy & Cybersecurity alerts

Weekly digest. AI-summarized, no noise.

Free. Unsubscribe anytime.

Get alerts for this source

We'll email you when CERT-Bund Security Advisories publishes new changes.

Free. Unsubscribe anytime.