Changeflow GovPing Data Privacy & Cybersecurity Multiple Vulnerabilities in Mattermost Allow Re...
Priority review Guidance Added Final

Multiple Vulnerabilities in Mattermost Allow Remote Attack CVSS 7.3

Favicon for wid.cert-bund.de CERT-Bund Security Advisories
Published
Detected
Email

Summary

CERT-Bund issued security advisory WID-SEC-2026-1173 disclosing multiple vulnerabilities in Mattermost instant-messaging software. Affected versions include Mattermost prior to 11.7.0, 11.6.1, 11.5.4, 11.4.5, and 10.11.15. An attacker can exploit these vulnerabilities to conduct a remote attack. The vulnerability has a CVSS Base Score of 7.3 (high) and Temporal Score of 6.4 (medium). Mitigations are available.

Why this matters

Organisations running Mattermost should audit their deployments against the affected version list. Given the CVSS 7.3 score and remote attack vector, self-hosted Mattermost instances should be treated as a priority patching target. CVEs associated with this advisory should be tracked for detailed remediation guidance.

AI-drafted from the source document, validated against GovPing's analyst note standards . For the primary regulatory language, read the source document .
Published by CERT-Bund on wid.cert-bund.de . Detected, standardized, and enriched by GovPing. Review our methodology and editorial standards .

What changed

CERT-Bund published a security advisory identifying multiple vulnerabilities in Mattermost collaboration platform. The vulnerabilities affect multiple versions across the 10.x, 11.x, and 11.x product lines. The CVSS Base Score of 7.3 indicates high severity, and the attack vector is remote, meaning no physical access is required.

Organisations running Mattermost should immediately identify affected deployments and apply available patches or mitigations. The advisory covers Linux, UNIX, Windows, and other operating system environments where Mattermost is deployed. Security teams should prioritise patching given the high CVSS score and remote exploitability.

What to do next

  1. Identify if any Mattermost instances run affected versions (<11.7.0, <11.6.1, <11.5.4, <11.4.5, <10.11.15)
  2. Apply available patches or mitigations to affected systems

Archived snapshot

Apr 20, 2026

GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.

[WID-SEC-2026-1173] Mattermost: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff CVSS Base Score 7.3 (hoch) CVSS Temporal Score 6.4 (mittel) Remoteangriff ja Datum 19.04.2026 Stand 20.04.2026 Mitigation ja

Betroffene Systeme

Betriebssystem

  • Linux
  • Sonstiges
  • UNIX
  • Windows

Produktbeschreibung

Mattermost ist ein webbasierter Instant-Messaging-Dienst.

Produkte

19.04.2026
- Mattermost Mattermost <11.7.0

  • Mattermost Mattermost <11.6.1

  • Mattermost Mattermost <11.5.4

  • Mattermost Mattermost <11.4.5

  • Mattermost Mattermost <10.11.15

Angriff

Angriff

Ein Angreifer kann mehrere Schwachstellen in Mattermost ausnutzen, um einen nicht näher spezifizierten Angriff durchzuführen. CVE Informationen Versionshistorie Feedback zum Advisory geben

Get daily alerts for CERT-Bund Security Advisories

Daily digest delivered to your inbox.

Free. Unsubscribe anytime.

About this page

What is GovPing?

Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission

What's from the agency?

Source document text, dates, docket IDs, and authority are extracted directly from CERT-Bund.

What's AI-generated?

The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.

Last updated

Classification

Agency
CERT-Bund
Published
April 19th, 2026
Instrument
Guidance
Branch
Executive
Source language
de
Legal weight
Non-binding
Stage
Final
Change scope
Substantive
Document ID
WID-SEC-2026-1173

Who this affects

Applies to
Technology companies Government agencies Organizations using Mattermost
Industry sector
5112 Software & Technology
Activity scope
Vulnerability management Patch management Security incident response
Geographic scope
Germany DE

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Compliance frameworks
NIST CSF
Topics
Data Privacy Information Security

Get alerts for this source

We'll email you when CERT-Bund Security Advisories publishes new changes.

Free. Unsubscribe anytime.

You're subscribed!