Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-2476 (GCVE-0-2026-2476)
Vulnerability from cvelistv5 – Published: 2026-03-16 11:11 – Updated: 2026-03-16 13:49
VLAI?
EPSS
Title
MS Teams plugin sensitive config values not properly masked in support packets
Summary
Mattermost Plugins versions <=2.0.3.0 fail to properly mask sensitive configuration values which allows an attacker with access to support packets to obtain original plugin settings via exported configuration data. Mattermost Advisory ID: MMSA-2026-00606
Severity ?
7.6 (High)
CWE
- CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Assigner
References
1 reference
| URL | Tags |
|---|---|
| https://mattermost.com/security-updates | vendor-advisory |
Impacted products
1 product
| Vendor | Product | Version | |
|---|---|---|---|
| Mattermost | Mattermost |
Affected:
0 , ≤ 2.0.3
(semver)
Unaffected: 2.3.1.0 |
Credits
Yash-Chakerverti
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-2476",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-03-16T13:42:55.950049Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-03-16T13:49:58.500Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Mattermost",
"vendor": "Mattermost",
"versions": [
{
"lessThanOrEqual": "2.0.3",
"status": "affected",
"version": "0",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "2.3.1.0"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Yash-Chakerverti"
}
],
"descriptions": [
{
"lang": "en",
"value": "Mattermost Plugins versions \u003c=2.0.3.0 fail to properly mask sensitive configuration values which allows an attacker with access to support packets to obtain original plugin settings via exported configuration data. Mattermost Advisory ID: MMSA-2026-00606"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-200",
"description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-03-16T11:11:07.387Z",
"orgId": "9302f53e-dde5-4bf3-b2f2-a83f91ac0eee",
"shortName": "Mattermost"
},
"references": [
{
"name": "MMSA-2026-00606",
"tags": [
"vendor-advisory"
],
"url": "https://mattermost.com/security-updates"
}
],
"solutions": [
{
"lang": "en",
"value": "Update Mattermost Plugins to versions 2.3.1.0 or higher."
}
],
"source": {
"advisory": "MMSA-2026-00606",
"defect": [
"https://mattermost.atlassian.net/browse/MM-67533"
],
"discovery": "EXTERNAL"
},
"title": "MS Teams plugin sensitive config values not properly masked in support packets",
"x_generator": {
"engine": "cvelib 1.8.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "9302f53e-dde5-4bf3-b2f2-a83f91ac0eee",
"assignerShortName": "Mattermost",
"cveId": "CVE-2026-2476",
"datePublished": "2026-03-16T11:11:07.387Z",
"dateReserved": "2026-02-13T15:59:24.864Z",
"dateUpdated": "2026-03-16T13:49:58.500Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-2476",
"date": "2026-05-12",
"epss": "0.00036",
"percentile": "0.10868"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-2476\",\"sourceIdentifier\":\"responsibledisclosure@mattermost.com\",\"published\":\"2026-03-16T14:19:30.373\",\"lastModified\":\"2026-03-20T18:29:11.980\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Mattermost Plugins versions \u003c=2.0.3.0 fail to properly mask sensitive configuration values which allows an attacker with access to support packets to obtain original plugin settings via exported configuration data. Mattermost Advisory ID: MMSA-2026-00606\"},{\"lang\":\"es\",\"value\":\"Las versiones \u0026lt;=2.0.3.0 de los plugins de Mattermost no logran enmascarar correctamente los valores de configuraci\u00f3n sensibles, lo que permite a un atacante con acceso a los paquetes de soporte obtener la configuraci\u00f3n original del plugin a trav\u00e9s de datos de configuraci\u00f3n exportados. ID de Aviso de Mattermost: MMSA-2026-00606\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"responsibledisclosure@mattermost.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:N\",\"baseScore\":7.6,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.3,\"impactScore\":4.7},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N\",\"baseScore\":4.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"responsibledisclosure@mattermost.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mattermost:ms_teams:*:*:*:*:*:mattermost:*:*\",\"versionEndExcluding\":\"2.3.1\",\"matchCriteriaId\":\"7A937D4F-6200-46BF-8193-CD5DDB4B5E6C\"}]}]}],\"references\":[{\"url\":\"https://mattermost.com/security-updates\",\"source\":\"responsibledisclosure@mattermost.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-2476\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-03-16T13:42:55.950049Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-03-16T13:44:21.926Z\"}}], \"cna\": {\"title\": \"MS Teams plugin sensitive config values not properly masked in support packets\", \"source\": {\"defect\": [\"https://mattermost.atlassian.net/browse/MM-67533\"], \"advisory\": \"MMSA-2026-00606\", \"discovery\": \"EXTERNAL\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Yash-Chakerverti\"}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 7.6, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:N\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"HIGH\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Mattermost\", \"product\": \"Mattermost\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"2.0.3\"}, {\"status\": \"unaffected\", \"version\": \"2.3.1.0\"}], \"defaultStatus\": \"unaffected\"}], \"solutions\": [{\"lang\": \"en\", \"value\": \"Update Mattermost Plugins to versions 2.3.1.0 or higher.\"}], \"references\": [{\"url\": \"https://mattermost.com/security-updates\", \"name\": \"MMSA-2026-00606\", \"tags\": [\"vendor-advisory\"]}], \"x_generator\": {\"engine\": \"cvelib 1.8.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Mattermost Plugins versions \u003c=2.0.3.0 fail to properly mask sensitive configuration values which allows an attacker with access to support packets to obtain original plugin settings via exported configuration data. Mattermost Advisory ID: MMSA-2026-00606\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-200\", \"description\": \"CWE-200 Exposure of Sensitive Information to an Unauthorized Actor\"}]}], \"providerMetadata\": {\"orgId\": \"9302f53e-dde5-4bf3-b2f2-a83f91ac0eee\", \"shortName\": \"Mattermost\", \"dateUpdated\": \"2026-03-16T11:11:07.387Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-2476\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-03-16T13:49:58.500Z\", \"dateReserved\": \"2026-02-13T15:59:24.864Z\", \"assignerOrgId\": \"9302f53e-dde5-4bf3-b2f2-a83f91ac0eee\", \"datePublished\": \"2026-03-16T11:11:07.387Z\", \"assignerShortName\": \"Mattermost\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
WID-SEC-W-2026-0422
Vulnerability from csaf_certbund - Published: 2026-02-15 23:00 - Updated: 2026-03-19 23:00Summary
Mattermost: Mehrere Schwachstellen
Severity
Mittel
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: Mattermost ist ein webbasierter Instant-Messaging-Dienst.
Angriff: Ein authentisierter Angreifer kann mehrere Schwachstellen in Mattermost ausnutzen, um falsche Informationen anzuzeigen, Informationen offenzulegen, Sicherheitskontrollen zu umgehen und eine Denial-of-Service-Situation zu erzeugen.
Betroffene Betriebssysteme: - Linux
- Sonstiges
- UNIX
- Windows
Affected products
Known affected
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Mattermost Mattermost Plugins <10.11.11
Mattermost / Mattermost
|
Plugins <10.11.11 | ||
|
Mattermost Mattermost Plugins <2.3.1.0
Mattermost / Mattermost
|
Plugins <2.3.1.0 | ||
|
Mattermost Mattermost Desktop <5.13.4.0
Mattermost / Mattermost
|
Desktop <5.13.4.0 | ||
|
Mattermost Mattermost Desktop <5.13.3.0
Mattermost / Mattermost
|
Desktop <5.13.3.0 | ||
|
Mattermost Mattermost Server <10.11.11
Mattermost / Mattermost
|
Server <10.11.11 | ||
|
Mattermost Mattermost Server <11.4.0
Mattermost / Mattermost
|
Server <11.4.0 | ||
|
Mattermost Mattermost Server <11.3.1
Mattermost / Mattermost
|
Server <11.3.1 | ||
|
Mattermost Mattermost Server <11.2.3
Mattermost / Mattermost
|
Server <11.2.3 |
Affected products
Known affected
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Mattermost Mattermost Plugins <10.11.11
Mattermost / Mattermost
|
Plugins <10.11.11 | ||
|
Mattermost Mattermost Plugins <2.3.1.0
Mattermost / Mattermost
|
Plugins <2.3.1.0 | ||
|
Mattermost Mattermost Desktop <5.13.4.0
Mattermost / Mattermost
|
Desktop <5.13.4.0 | ||
|
Mattermost Mattermost Desktop <5.13.3.0
Mattermost / Mattermost
|
Desktop <5.13.3.0 | ||
|
Mattermost Mattermost Server <10.11.11
Mattermost / Mattermost
|
Server <10.11.11 | ||
|
Mattermost Mattermost Server <11.4.0
Mattermost / Mattermost
|
Server <11.4.0 | ||
|
Mattermost Mattermost Server <11.3.1
Mattermost / Mattermost
|
Server <11.3.1 | ||
|
Mattermost Mattermost Server <11.2.3
Mattermost / Mattermost
|
Server <11.2.3 |
Affected products
Known affected
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Mattermost Mattermost Plugins <10.11.11
Mattermost / Mattermost
|
Plugins <10.11.11 | ||
|
Mattermost Mattermost Plugins <2.3.1.0
Mattermost / Mattermost
|
Plugins <2.3.1.0 | ||
|
Mattermost Mattermost Desktop <5.13.4.0
Mattermost / Mattermost
|
Desktop <5.13.4.0 | ||
|
Mattermost Mattermost Desktop <5.13.3.0
Mattermost / Mattermost
|
Desktop <5.13.3.0 | ||
|
Mattermost Mattermost Server <10.11.11
Mattermost / Mattermost
|
Server <10.11.11 | ||
|
Mattermost Mattermost Server <11.4.0
Mattermost / Mattermost
|
Server <11.4.0 | ||
|
Mattermost Mattermost Server <11.3.1
Mattermost / Mattermost
|
Server <11.3.1 | ||
|
Mattermost Mattermost Server <11.2.3
Mattermost / Mattermost
|
Server <11.2.3 |
Affected products
Known affected
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Mattermost Mattermost Plugins <10.11.11
Mattermost / Mattermost
|
Plugins <10.11.11 | ||
|
Mattermost Mattermost Plugins <2.3.1.0
Mattermost / Mattermost
|
Plugins <2.3.1.0 | ||
|
Mattermost Mattermost Desktop <5.13.4.0
Mattermost / Mattermost
|
Desktop <5.13.4.0 | ||
|
Mattermost Mattermost Desktop <5.13.3.0
Mattermost / Mattermost
|
Desktop <5.13.3.0 | ||
|
Mattermost Mattermost Server <10.11.11
Mattermost / Mattermost
|
Server <10.11.11 | ||
|
Mattermost Mattermost Server <11.4.0
Mattermost / Mattermost
|
Server <11.4.0 | ||
|
Mattermost Mattermost Server <11.3.1
Mattermost / Mattermost
|
Server <11.3.1 | ||
|
Mattermost Mattermost Server <11.2.3
Mattermost / Mattermost
|
Server <11.2.3 |
Affected products
Known affected
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Mattermost Mattermost Plugins <10.11.11
Mattermost / Mattermost
|
Plugins <10.11.11 | ||
|
Mattermost Mattermost Plugins <2.3.1.0
Mattermost / Mattermost
|
Plugins <2.3.1.0 | ||
|
Mattermost Mattermost Desktop <5.13.4.0
Mattermost / Mattermost
|
Desktop <5.13.4.0 | ||
|
Mattermost Mattermost Desktop <5.13.3.0
Mattermost / Mattermost
|
Desktop <5.13.3.0 | ||
|
Mattermost Mattermost Server <10.11.11
Mattermost / Mattermost
|
Server <10.11.11 | ||
|
Mattermost Mattermost Server <11.4.0
Mattermost / Mattermost
|
Server <11.4.0 | ||
|
Mattermost Mattermost Server <11.3.1
Mattermost / Mattermost
|
Server <11.3.1 | ||
|
Mattermost Mattermost Server <11.2.3
Mattermost / Mattermost
|
Server <11.2.3 |
Affected products
Known affected
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Mattermost Mattermost Plugins <10.11.11
Mattermost / Mattermost
|
Plugins <10.11.11 | ||
|
Mattermost Mattermost Plugins <2.3.1.0
Mattermost / Mattermost
|
Plugins <2.3.1.0 | ||
|
Mattermost Mattermost Desktop <5.13.4.0
Mattermost / Mattermost
|
Desktop <5.13.4.0 | ||
|
Mattermost Mattermost Desktop <5.13.3.0
Mattermost / Mattermost
|
Desktop <5.13.3.0 | ||
|
Mattermost Mattermost Server <10.11.11
Mattermost / Mattermost
|
Server <10.11.11 | ||
|
Mattermost Mattermost Server <11.4.0
Mattermost / Mattermost
|
Server <11.4.0 | ||
|
Mattermost Mattermost Server <11.3.1
Mattermost / Mattermost
|
Server <11.3.1 | ||
|
Mattermost Mattermost Server <11.2.3
Mattermost / Mattermost
|
Server <11.2.3 |
Affected products
Known affected
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Mattermost Mattermost Plugins <10.11.11
Mattermost / Mattermost
|
Plugins <10.11.11 | ||
|
Mattermost Mattermost Plugins <2.3.1.0
Mattermost / Mattermost
|
Plugins <2.3.1.0 | ||
|
Mattermost Mattermost Desktop <5.13.4.0
Mattermost / Mattermost
|
Desktop <5.13.4.0 | ||
|
Mattermost Mattermost Desktop <5.13.3.0
Mattermost / Mattermost
|
Desktop <5.13.3.0 | ||
|
Mattermost Mattermost Server <10.11.11
Mattermost / Mattermost
|
Server <10.11.11 | ||
|
Mattermost Mattermost Server <11.4.0
Mattermost / Mattermost
|
Server <11.4.0 | ||
|
Mattermost Mattermost Server <11.3.1
Mattermost / Mattermost
|
Server <11.3.1 | ||
|
Mattermost Mattermost Server <11.2.3
Mattermost / Mattermost
|
Server <11.2.3 |
Affected products
Known affected
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Mattermost Mattermost Plugins <10.11.11
Mattermost / Mattermost
|
Plugins <10.11.11 | ||
|
Mattermost Mattermost Plugins <2.3.1.0
Mattermost / Mattermost
|
Plugins <2.3.1.0 | ||
|
Mattermost Mattermost Desktop <5.13.4.0
Mattermost / Mattermost
|
Desktop <5.13.4.0 | ||
|
Mattermost Mattermost Desktop <5.13.3.0
Mattermost / Mattermost
|
Desktop <5.13.3.0 | ||
|
Mattermost Mattermost Server <10.11.11
Mattermost / Mattermost
|
Server <10.11.11 | ||
|
Mattermost Mattermost Server <11.4.0
Mattermost / Mattermost
|
Server <11.4.0 | ||
|
Mattermost Mattermost Server <11.3.1
Mattermost / Mattermost
|
Server <11.3.1 | ||
|
Mattermost Mattermost Server <11.2.3
Mattermost / Mattermost
|
Server <11.2.3 |
Affected products
Known affected
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Mattermost Mattermost Plugins <10.11.11
Mattermost / Mattermost
|
Plugins <10.11.11 | ||
|
Mattermost Mattermost Plugins <2.3.1.0
Mattermost / Mattermost
|
Plugins <2.3.1.0 | ||
|
Mattermost Mattermost Desktop <5.13.4.0
Mattermost / Mattermost
|
Desktop <5.13.4.0 | ||
|
Mattermost Mattermost Desktop <5.13.3.0
Mattermost / Mattermost
|
Desktop <5.13.3.0 | ||
|
Mattermost Mattermost Server <10.11.11
Mattermost / Mattermost
|
Server <10.11.11 | ||
|
Mattermost Mattermost Server <11.4.0
Mattermost / Mattermost
|
Server <11.4.0 | ||
|
Mattermost Mattermost Server <11.3.1
Mattermost / Mattermost
|
Server <11.3.1 | ||
|
Mattermost Mattermost Server <11.2.3
Mattermost / Mattermost
|
Server <11.2.3 |
Affected products
Known affected
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Mattermost Mattermost Plugins <10.11.11
Mattermost / Mattermost
|
Plugins <10.11.11 | ||
|
Mattermost Mattermost Plugins <2.3.1.0
Mattermost / Mattermost
|
Plugins <2.3.1.0 | ||
|
Mattermost Mattermost Desktop <5.13.4.0
Mattermost / Mattermost
|
Desktop <5.13.4.0 | ||
|
Mattermost Mattermost Desktop <5.13.3.0
Mattermost / Mattermost
|
Desktop <5.13.3.0 | ||
|
Mattermost Mattermost Server <10.11.11
Mattermost / Mattermost
|
Server <10.11.11 | ||
|
Mattermost Mattermost Server <11.4.0
Mattermost / Mattermost
|
Server <11.4.0 | ||
|
Mattermost Mattermost Server <11.3.1
Mattermost / Mattermost
|
Server <11.3.1 | ||
|
Mattermost Mattermost Server <11.2.3
Mattermost / Mattermost
|
Server <11.2.3 |
Affected products
Known affected
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Mattermost Mattermost Plugins <10.11.11
Mattermost / Mattermost
|
Plugins <10.11.11 | ||
|
Mattermost Mattermost Plugins <2.3.1.0
Mattermost / Mattermost
|
Plugins <2.3.1.0 | ||
|
Mattermost Mattermost Desktop <5.13.4.0
Mattermost / Mattermost
|
Desktop <5.13.4.0 | ||
|
Mattermost Mattermost Desktop <5.13.3.0
Mattermost / Mattermost
|
Desktop <5.13.3.0 | ||
|
Mattermost Mattermost Server <10.11.11
Mattermost / Mattermost
|
Server <10.11.11 | ||
|
Mattermost Mattermost Server <11.4.0
Mattermost / Mattermost
|
Server <11.4.0 | ||
|
Mattermost Mattermost Server <11.3.1
Mattermost / Mattermost
|
Server <11.3.1 | ||
|
Mattermost Mattermost Server <11.2.3
Mattermost / Mattermost
|
Server <11.2.3 |
Affected products
Known affected
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Mattermost Mattermost Plugins <10.11.11
Mattermost / Mattermost
|
Plugins <10.11.11 | ||
|
Mattermost Mattermost Plugins <2.3.1.0
Mattermost / Mattermost
|
Plugins <2.3.1.0 | ||
|
Mattermost Mattermost Desktop <5.13.4.0
Mattermost / Mattermost
|
Desktop <5.13.4.0 | ||
|
Mattermost Mattermost Desktop <5.13.3.0
Mattermost / Mattermost
|
Desktop <5.13.3.0 | ||
|
Mattermost Mattermost Server <10.11.11
Mattermost / Mattermost
|
Server <10.11.11 | ||
|
Mattermost Mattermost Server <11.4.0
Mattermost / Mattermost
|
Server <11.4.0 | ||
|
Mattermost Mattermost Server <11.3.1
Mattermost / Mattermost
|
Server <11.3.1 | ||
|
Mattermost Mattermost Server <11.2.3
Mattermost / Mattermost
|
Server <11.2.3 |
Affected products
Known affected
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Mattermost Mattermost Plugins <10.11.11
Mattermost / Mattermost
|
Plugins <10.11.11 | ||
|
Mattermost Mattermost Plugins <2.3.1.0
Mattermost / Mattermost
|
Plugins <2.3.1.0 | ||
|
Mattermost Mattermost Desktop <5.13.4.0
Mattermost / Mattermost
|
Desktop <5.13.4.0 | ||
|
Mattermost Mattermost Desktop <5.13.3.0
Mattermost / Mattermost
|
Desktop <5.13.3.0 | ||
|
Mattermost Mattermost Server <10.11.11
Mattermost / Mattermost
|
Server <10.11.11 | ||
|
Mattermost Mattermost Server <11.4.0
Mattermost / Mattermost
|
Server <11.4.0 | ||
|
Mattermost Mattermost Server <11.3.1
Mattermost / Mattermost
|
Server <11.3.1 | ||
|
Mattermost Mattermost Server <11.2.3
Mattermost / Mattermost
|
Server <11.2.3 |
Affected products
Known affected
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Mattermost Mattermost Plugins <10.11.11
Mattermost / Mattermost
|
Plugins <10.11.11 | ||
|
Mattermost Mattermost Plugins <2.3.1.0
Mattermost / Mattermost
|
Plugins <2.3.1.0 | ||
|
Mattermost Mattermost Desktop <5.13.4.0
Mattermost / Mattermost
|
Desktop <5.13.4.0 | ||
|
Mattermost Mattermost Desktop <5.13.3.0
Mattermost / Mattermost
|
Desktop <5.13.3.0 | ||
|
Mattermost Mattermost Server <10.11.11
Mattermost / Mattermost
|
Server <10.11.11 | ||
|
Mattermost Mattermost Server <11.4.0
Mattermost / Mattermost
|
Server <11.4.0 | ||
|
Mattermost Mattermost Server <11.3.1
Mattermost / Mattermost
|
Server <11.3.1 | ||
|
Mattermost Mattermost Server <11.2.3
Mattermost / Mattermost
|
Server <11.2.3 |
Affected products
Known affected
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Mattermost Mattermost Plugins <10.11.11
Mattermost / Mattermost
|
Plugins <10.11.11 | ||
|
Mattermost Mattermost Plugins <2.3.1.0
Mattermost / Mattermost
|
Plugins <2.3.1.0 | ||
|
Mattermost Mattermost Desktop <5.13.4.0
Mattermost / Mattermost
|
Desktop <5.13.4.0 | ||
|
Mattermost Mattermost Desktop <5.13.3.0
Mattermost / Mattermost
|
Desktop <5.13.3.0 | ||
|
Mattermost Mattermost Server <10.11.11
Mattermost / Mattermost
|
Server <10.11.11 | ||
|
Mattermost Mattermost Server <11.4.0
Mattermost / Mattermost
|
Server <11.4.0 | ||
|
Mattermost Mattermost Server <11.3.1
Mattermost / Mattermost
|
Server <11.3.1 | ||
|
Mattermost Mattermost Server <11.2.3
Mattermost / Mattermost
|
Server <11.2.3 |
Affected products
Known affected
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Mattermost Mattermost Plugins <10.11.11
Mattermost / Mattermost
|
Plugins <10.11.11 | ||
|
Mattermost Mattermost Plugins <2.3.1.0
Mattermost / Mattermost
|
Plugins <2.3.1.0 | ||
|
Mattermost Mattermost Desktop <5.13.4.0
Mattermost / Mattermost
|
Desktop <5.13.4.0 | ||
|
Mattermost Mattermost Desktop <5.13.3.0
Mattermost / Mattermost
|
Desktop <5.13.3.0 | ||
|
Mattermost Mattermost Server <10.11.11
Mattermost / Mattermost
|
Server <10.11.11 | ||
|
Mattermost Mattermost Server <11.4.0
Mattermost / Mattermost
|
Server <11.4.0 | ||
|
Mattermost Mattermost Server <11.3.1
Mattermost / Mattermost
|
Server <11.3.1 | ||
|
Mattermost Mattermost Server <11.2.3
Mattermost / Mattermost
|
Server <11.2.3 |
Affected products
Known affected
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Mattermost Mattermost Plugins <10.11.11
Mattermost / Mattermost
|
Plugins <10.11.11 | ||
|
Mattermost Mattermost Plugins <2.3.1.0
Mattermost / Mattermost
|
Plugins <2.3.1.0 | ||
|
Mattermost Mattermost Desktop <5.13.4.0
Mattermost / Mattermost
|
Desktop <5.13.4.0 | ||
|
Mattermost Mattermost Desktop <5.13.3.0
Mattermost / Mattermost
|
Desktop <5.13.3.0 | ||
|
Mattermost Mattermost Server <10.11.11
Mattermost / Mattermost
|
Server <10.11.11 | ||
|
Mattermost Mattermost Server <11.4.0
Mattermost / Mattermost
|
Server <11.4.0 | ||
|
Mattermost Mattermost Server <11.3.1
Mattermost / Mattermost
|
Server <11.3.1 | ||
|
Mattermost Mattermost Server <11.2.3
Mattermost / Mattermost
|
Server <11.2.3 |
Affected products
Known affected
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Mattermost Mattermost Plugins <10.11.11
Mattermost / Mattermost
|
Plugins <10.11.11 | ||
|
Mattermost Mattermost Plugins <2.3.1.0
Mattermost / Mattermost
|
Plugins <2.3.1.0 | ||
|
Mattermost Mattermost Desktop <5.13.4.0
Mattermost / Mattermost
|
Desktop <5.13.4.0 | ||
|
Mattermost Mattermost Desktop <5.13.3.0
Mattermost / Mattermost
|
Desktop <5.13.3.0 | ||
|
Mattermost Mattermost Server <10.11.11
Mattermost / Mattermost
|
Server <10.11.11 | ||
|
Mattermost Mattermost Server <11.4.0
Mattermost / Mattermost
|
Server <11.4.0 | ||
|
Mattermost Mattermost Server <11.3.1
Mattermost / Mattermost
|
Server <11.3.1 | ||
|
Mattermost Mattermost Server <11.2.3
Mattermost / Mattermost
|
Server <11.2.3 |
Affected products
Known affected
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Mattermost Mattermost Plugins <10.11.11
Mattermost / Mattermost
|
Plugins <10.11.11 | ||
|
Mattermost Mattermost Plugins <2.3.1.0
Mattermost / Mattermost
|
Plugins <2.3.1.0 | ||
|
Mattermost Mattermost Desktop <5.13.4.0
Mattermost / Mattermost
|
Desktop <5.13.4.0 | ||
|
Mattermost Mattermost Desktop <5.13.3.0
Mattermost / Mattermost
|
Desktop <5.13.3.0 | ||
|
Mattermost Mattermost Server <10.11.11
Mattermost / Mattermost
|
Server <10.11.11 | ||
|
Mattermost Mattermost Server <11.4.0
Mattermost / Mattermost
|
Server <11.4.0 | ||
|
Mattermost Mattermost Server <11.3.1
Mattermost / Mattermost
|
Server <11.3.1 | ||
|
Mattermost Mattermost Server <11.2.3
Mattermost / Mattermost
|
Server <11.2.3 |
References
5 references
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Mattermost ist ein webbasierter Instant-Messaging-Dienst.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein authentisierter Angreifer kann mehrere Schwachstellen in Mattermost ausnutzen, um falsche Informationen anzuzeigen, Informationen offenzulegen, Sicherheitskontrollen zu umgehen und eine Denial-of-Service-Situation zu erzeugen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2026-0422 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0422.json"
},
{
"category": "self",
"summary": "WID-SEC-2026-0422 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0422"
},
{
"category": "external",
"summary": "Mattermost Security Updates vom 2026-02-15",
"url": "https://mattermost.com/security-updates/#desktop"
},
{
"category": "external",
"summary": "Mattermost Security Updates vom 2026-02-15",
"url": "https://mattermost.com/security-updates/#plugins"
},
{
"category": "external",
"summary": "Mattermost Security Updates vom 2026-02-15",
"url": "https://mattermost.com/security-updates/#server"
}
],
"source_lang": "en-US",
"title": "Mattermost: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-03-19T23:00:00.000+00:00",
"generator": {
"date": "2026-03-20T08:33:09.017+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2026-0422",
"initial_release_date": "2026-02-15T23:00:00.000+00:00",
"revision_history": [
{
"date": "2026-02-15T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-03-02T23:00:00.000+00:00",
"number": "2",
"summary": "Referenz(en) aufgenommen: EUVD-2026-9174"
},
{
"date": "2026-03-16T23:00:00.000+00:00",
"number": "3",
"summary": "Referenz(en) aufgenommen: EUVD-2026-12411, EUVD-2026-12409, EUVD-2026-12385, EUVD-2026-12430, EUVD-2026-12405, EUVD-2026-12516, EUVD-2026-12510, EUVD-2026-12443, EUVD-2026-12439, EUVD-2026-12416, EUVD-2026-12518, EUVD-2026-12512, EUVD-2026-12441, EUVD-2026-12437, EUVD-2026-12383, EUVD-2026-12417, EUVD-2026-12413, EUVD-2026-12407"
},
{
"date": "2026-03-18T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Informationen von Mattermost aufgenommen"
},
{
"date": "2026-03-19T23:00:00.000+00:00",
"number": "5",
"summary": "CVE-2026-2476, CVE-2026-2461 erg\u00e4nzt"
}
],
"status": "final",
"version": "5"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "Plugins \u003c2.3.1.0",
"product": {
"name": "Mattermost Mattermost Plugins \u003c2.3.1.0",
"product_id": "T050924"
}
},
{
"category": "product_version",
"name": "Plugins 2.3.1.0",
"product": {
"name": "Mattermost Mattermost Plugins 2.3.1.0",
"product_id": "T050924-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:mattermost:mattermost_server:plugins__2.3.1.0"
}
}
},
{
"category": "product_version_range",
"name": "Plugins \u003c10.11.11",
"product": {
"name": "Mattermost Mattermost Plugins \u003c10.11.11",
"product_id": "T050925"
}
},
{
"category": "product_version",
"name": "Plugins 10.11.11",
"product": {
"name": "Mattermost Mattermost Plugins 10.11.11",
"product_id": "T050925-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:mattermost:mattermost_server:plugins__10.11.11"
}
}
},
{
"category": "product_version_range",
"name": "Desktop \u003c5.13.3.0",
"product": {
"name": "Mattermost Mattermost Desktop \u003c5.13.3.0",
"product_id": "T050926"
}
},
{
"category": "product_version",
"name": "Desktop 5.13.3.0",
"product": {
"name": "Mattermost Mattermost Desktop 5.13.3.0",
"product_id": "T050926-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:mattermost:mattermost_server:desktop__5.13.3.0"
}
}
},
{
"category": "product_version_range",
"name": "Desktop \u003c5.13.4.0",
"product": {
"name": "Mattermost Mattermost Desktop \u003c5.13.4.0",
"product_id": "T050927"
}
},
{
"category": "product_version",
"name": "Desktop 5.13.4.0",
"product": {
"name": "Mattermost Mattermost Desktop 5.13.4.0",
"product_id": "T050927-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:mattermost:mattermost_server:desktop__5.13.4.0"
}
}
},
{
"category": "product_version_range",
"name": "Server \u003c11.2.3",
"product": {
"name": "Mattermost Mattermost Server \u003c11.2.3",
"product_id": "T050929"
}
},
{
"category": "product_version",
"name": "Server 11.2.3",
"product": {
"name": "Mattermost Mattermost Server 11.2.3",
"product_id": "T050929-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:mattermost:mattermost_server:server__11.2.3"
}
}
},
{
"category": "product_version_range",
"name": "Server \u003c11.3.1",
"product": {
"name": "Mattermost Mattermost Server \u003c11.3.1",
"product_id": "T050930"
}
},
{
"category": "product_version",
"name": "Server 11.3.1",
"product": {
"name": "Mattermost Mattermost Server 11.3.1",
"product_id": "T050930-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:mattermost:mattermost_server:server__11.3.1"
}
}
},
{
"category": "product_version_range",
"name": "Server \u003c11.4.0",
"product": {
"name": "Mattermost Mattermost Server \u003c11.4.0",
"product_id": "T050931"
}
},
{
"category": "product_version",
"name": "Server 11.4.0",
"product": {
"name": "Mattermost Mattermost Server 11.4.0",
"product_id": "T050931-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:mattermost:mattermost_server:server__11.4.0"
}
}
},
{
"category": "product_version_range",
"name": "Server \u003c10.11.11",
"product": {
"name": "Mattermost Mattermost Server \u003c10.11.11",
"product_id": "T050932"
}
},
{
"category": "product_version",
"name": "Server 10.11.11",
"product": {
"name": "Mattermost Mattermost Server 10.11.11",
"product_id": "T050932-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:mattermost:mattermost_server:server__10.11.11"
}
}
}
],
"category": "product_name",
"name": "Mattermost"
}
],
"category": "vendor",
"name": "Mattermost"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-1629",
"product_status": {
"known_affected": [
"T050925",
"T050924",
"T050927",
"T050926",
"T050932",
"T050931",
"T050930",
"T050929"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-1629"
},
{
"cve": "CVE-2026-21386",
"product_status": {
"known_affected": [
"T050925",
"T050924",
"T050927",
"T050926",
"T050932",
"T050931",
"T050930",
"T050929"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-21386"
},
{
"cve": "CVE-2026-22545",
"product_status": {
"known_affected": [
"T050925",
"T050924",
"T050927",
"T050926",
"T050932",
"T050931",
"T050930",
"T050929"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-22545"
},
{
"cve": "CVE-2026-24458",
"product_status": {
"known_affected": [
"T050925",
"T050924",
"T050927",
"T050926",
"T050932",
"T050931",
"T050930",
"T050929"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-24458"
},
{
"cve": "CVE-2026-2454",
"product_status": {
"known_affected": [
"T050925",
"T050924",
"T050927",
"T050926",
"T050932",
"T050931",
"T050930",
"T050929"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-2454"
},
{
"cve": "CVE-2026-2455",
"product_status": {
"known_affected": [
"T050925",
"T050924",
"T050927",
"T050926",
"T050932",
"T050931",
"T050930",
"T050929"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-2455"
},
{
"cve": "CVE-2026-2456",
"product_status": {
"known_affected": [
"T050925",
"T050924",
"T050927",
"T050926",
"T050932",
"T050931",
"T050930",
"T050929"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-2456"
},
{
"cve": "CVE-2026-2457",
"product_status": {
"known_affected": [
"T050925",
"T050924",
"T050927",
"T050926",
"T050932",
"T050931",
"T050930",
"T050929"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-2457"
},
{
"cve": "CVE-2026-2458",
"product_status": {
"known_affected": [
"T050925",
"T050924",
"T050927",
"T050926",
"T050932",
"T050931",
"T050930",
"T050929"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-2458"
},
{
"cve": "CVE-2026-2461",
"product_status": {
"known_affected": [
"T050925",
"T050924",
"T050927",
"T050926",
"T050932",
"T050931",
"T050930",
"T050929"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-2461"
},
{
"cve": "CVE-2026-2462",
"product_status": {
"known_affected": [
"T050925",
"T050924",
"T050927",
"T050926",
"T050932",
"T050931",
"T050930",
"T050929"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-2462"
},
{
"cve": "CVE-2026-2463",
"product_status": {
"known_affected": [
"T050925",
"T050924",
"T050927",
"T050926",
"T050932",
"T050931",
"T050930",
"T050929"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-2463"
},
{
"cve": "CVE-2026-24692",
"product_status": {
"known_affected": [
"T050925",
"T050924",
"T050927",
"T050926",
"T050932",
"T050931",
"T050930",
"T050929"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-24692"
},
{
"cve": "CVE-2026-2476",
"product_status": {
"known_affected": [
"T050925",
"T050924",
"T050927",
"T050926",
"T050932",
"T050931",
"T050930",
"T050929"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-2476"
},
{
"cve": "CVE-2026-25780",
"product_status": {
"known_affected": [
"T050925",
"T050924",
"T050927",
"T050926",
"T050932",
"T050931",
"T050930",
"T050929"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-25780"
},
{
"cve": "CVE-2026-25783",
"product_status": {
"known_affected": [
"T050925",
"T050924",
"T050927",
"T050926",
"T050932",
"T050931",
"T050930",
"T050929"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-25783"
},
{
"cve": "CVE-2026-26230",
"product_status": {
"known_affected": [
"T050925",
"T050924",
"T050927",
"T050926",
"T050932",
"T050931",
"T050930",
"T050929"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-26230"
},
{
"cve": "CVE-2026-26246",
"product_status": {
"known_affected": [
"T050925",
"T050924",
"T050927",
"T050926",
"T050932",
"T050931",
"T050930",
"T050929"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-26246"
},
{
"cve": "CVE-2026-26304",
"product_status": {
"known_affected": [
"T050925",
"T050924",
"T050927",
"T050926",
"T050932",
"T050931",
"T050930",
"T050929"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-26304"
}
]
}
GHSA-4PPJ-6CHV-5PGC
Vulnerability from github – Published: 2026-03-16 15:30 – Updated: 2026-03-19 19:25
VLAI?
Summary
Mattermost Microsoft Teams Plugin fails to properly mask sensitive configuration values
Details
Mattermost Plugins versions <=2.0.3.0 fail to properly mask sensitive configuration values which allows an attacker with access to support packets to obtain original plugin settings via exported configuration data. Mattermost Advisory ID: MMSA-2026-00606
Severity ?
7.6 (High)
{
"affected": [
{
"package": {
"ecosystem": "Go",
"name": "github.com/mattermost/mattermost-plugin-msteams"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.15.1-0.20260102165339-036c761bd3cb"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2026-2476"
],
"database_specific": {
"cwe_ids": [
"CWE-200"
],
"github_reviewed": true,
"github_reviewed_at": "2026-03-19T19:25:25Z",
"nvd_published_at": "2026-03-16T14:19:30Z",
"severity": "HIGH"
},
"details": "Mattermost Plugins versions \u003c=2.0.3.0 fail to properly mask sensitive configuration values which allows an attacker with access to support packets to obtain original plugin settings via exported configuration data. Mattermost Advisory ID: MMSA-2026-00606",
"id": "GHSA-4ppj-6chv-5pgc",
"modified": "2026-03-19T19:25:25Z",
"published": "2026-03-16T15:30:43Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2476"
},
{
"type": "WEB",
"url": "https://github.com/mattermost/mattermost-plugin-msteams/commit/036c761bd3cb9ece92c17f2b151dfa906cebdcf6"
},
{
"type": "PACKAGE",
"url": "https://github.com/mattermost/mattermost-plugin-msteams"
},
{
"type": "WEB",
"url": "https://mattermost.com/security-updates"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:N",
"type": "CVSS_V3"
}
],
"summary": "Mattermost Microsoft Teams Plugin fails to properly mask sensitive configuration values"
}
FKIE_CVE-2026-2476
Vulnerability from fkie_nvd - Published: 2026-03-16 14:19 - Updated: 2026-03-20 18:29
Severity ?
7.6 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Summary
Mattermost Plugins versions <=2.0.3.0 fail to properly mask sensitive configuration values which allows an attacker with access to support packets to obtain original plugin settings via exported configuration data. Mattermost Advisory ID: MMSA-2026-00606
References
| URL | Tags | ||
|---|---|---|---|
| responsibledisclosure@mattermost.com | https://mattermost.com/security-updates | Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| mattermost | ms_teams | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mattermost:ms_teams:*:*:*:*:*:mattermost:*:*",
"matchCriteriaId": "7A937D4F-6200-46BF-8193-CD5DDB4B5E6C",
"versionEndExcluding": "2.3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Mattermost Plugins versions \u003c=2.0.3.0 fail to properly mask sensitive configuration values which allows an attacker with access to support packets to obtain original plugin settings via exported configuration data. Mattermost Advisory ID: MMSA-2026-00606"
},
{
"lang": "es",
"value": "Las versiones \u0026lt;=2.0.3.0 de los plugins de Mattermost no logran enmascarar correctamente los valores de configuraci\u00f3n sensibles, lo que permite a un atacante con acceso a los paquetes de soporte obtener la configuraci\u00f3n original del plugin a trav\u00e9s de datos de configuraci\u00f3n exportados. ID de Aviso de Mattermost: MMSA-2026-00606"
}
],
"id": "CVE-2026-2476",
"lastModified": "2026-03-20T18:29:11.980",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 4.7,
"source": "responsibledisclosure@mattermost.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2026-03-16T14:19:30.373",
"references": [
{
"source": "responsibledisclosure@mattermost.com",
"tags": [
"Vendor Advisory"
],
"url": "https://mattermost.com/security-updates"
}
],
"sourceIdentifier": "responsibledisclosure@mattermost.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "responsibledisclosure@mattermost.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Trend slope:
-
(linear fit over daily sighting counts)
Show additional events:
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…