Description
Mattermost versions 11.1.x <= 11.1.2, 10.11.x <= 10.11.9, 11.2.x <= 11.2.1 and Mattermost Plugin Zoom versions <=1.11.0 fail to validate user identity and post ownership in the {{/api/v1/askPMI}} endpoint which allows unauthorized users to start Zoom meetings as any user and overwrite arbitrary posts via direct API calls with manipulated user IDs and post data.. Mattermost Advisory ID: MMSA-2025-00534
Published: 2026-02-16
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Zoom Meeting Creation and Post Modification
Action: Apply Patch
AI Analysis

Impact

The vulnerability arises from inadequate validation of user identity and post ownership when the Mattermost Zoom plugin processes API requests. An attacker who can send crafted requests to the /api/v1/askPMI endpoint may specify any user ID and post data, causing the system to start Zoom meetings as if they were the specified user and to overwrite arbitrary posts. The primary impact is the ability to impersonate other users, interfere with collaboration content, and potentially spread misinformation or disrupt communication. The weakness is classified as a lack of proper access control (CWE-862).

Affected Systems

Mattermost servers running versions 10.11.x (up to 10.11.9), 11.1.x (up to 11.1.2), and 11.2.x (up to 11.2.1) as well as the Mattermost Zoom plugin version 1.11.0 or earlier are affected. Upgrading the core Mattermost server to 11.3.0, 11.1.3, 10.11.10, or 11.2.2 and later, or upgrading the Zoom plugin to 1.12.0 and later, fixes the issue.

Risk and Exploitability

The CVSS score of 4.3 indicates a low overall severity, and the EPSS score of less than 1% suggests a very low probability of exploitation at this time. The vulnerability is not listed in the CISA KEV catalog. Attackers would need the ability to send API requests to the affected endpoint, which is typically restricted to authenticated users with API access. However, because the plugin fails to enforce ownership checks, a malicious user with API credentials can target any user ID, making the risk more pronounced in environments where API keys are widely available. The most likely attack vector involves manually crafting HTTP requests to the /api/v1/askPMI endpoint, specifying arbitrary user identifiers and post payloads.

Generated by OpenCVE AI on April 17, 2026 at 19:09 UTC.

Remediation

Vendor Solution

Update Mattermost to versions 11.3.0, 11.1.3, 10.11.10, 11.2.2 or higher. Alternatively, update Mattermost Zoom Plugin to version 1.12.0 or higher


OpenCVE Recommended Actions

  • Upgrade Mattermost to version 11.3.0, 11.1.3, 10.11.10, 11.2.2, or later.
  • Upgrade the Mattermost Zoom plugin to version 1.12.0 or later.
  • If upgrading is not immediately possible, disable or remove the Zoom plugin until a patch is applied to prevent unauthorized access to the /api/v1/askPMI endpoint.

Generated by OpenCVE AI on April 17, 2026 at 19:09 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-w65c-fvp5-fvc5 Mattermost Plugin Zoom fail to validate user identity and post ownership in the {{/api/v1/askPMI}} endpoint
References
History

Wed, 18 Feb 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Mattermost mattermost Server
Mattermost zoom
CPEs cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*
cpe:2.3:a:mattermost:zoom:*:*:*:*:*:mattermost:*:*
Vendors & Products Mattermost mattermost Server
Mattermost zoom

Tue, 17 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Mattermost
Mattermost mattermost
Vendors & Products Mattermost
Mattermost mattermost

Mon, 16 Feb 2026 10:15:00 +0000

Type Values Removed Values Added
Description Mattermost versions 11.1.x <= 11.1.2, 10.11.x <= 10.11.9, 11.2.x <= 11.2.1 and Mattermost Plugin Zoom versions <=1.11.0 fail to validate user identity and post ownership in the {{/api/v1/askPMI}} endpoint which allows unauthorized users to start Zoom meetings as any user and overwrite arbitrary posts via direct API calls with manipulated user IDs and post data.. Mattermost Advisory ID: MMSA-2025-00534
Title Mattermost Zoom Plugin allows unauthorized meeting creation and post modification via insufficient API access controls
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

Mattermost Mattermost Mattermost Server Zoom
cve-icon MITRE

Status: PUBLISHED

Assigner: Mattermost

Published:

Updated: 2026-02-17T15:00:44.691Z

Reserved: 2026-01-15T15:58:22.233Z

Link: CVE-2026-0998

cve-icon Vulnrichment

Updated: 2026-02-17T15:00:41.277Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-16T10:16:07.983

Modified: 2026-02-18T20:22:51.917

Link: CVE-2026-0998

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T19:15:26Z

Weaknesses