Description
Mattermost Desktop App versions <=6.0 6.2.0 5.2.13.0 fail to validate help links which allows a malicious Mattermost server to execute arbitrary executables on a user’s system via the user clicking on certain items in the Help menu Mattermost Advisory ID: MMSA-2026-00577
Published: 2026-02-16
Score: 7.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary code execution via unvalidated Help menu URLs
Action: Patch Immediately
AI Analysis

Impact

Mattermost Desktop App versions up to and including 6.0, 6.2.0, and 5.2.13.0 fail to validate links presented in the Help menu. A remote Mattermost server can publish a URL that, when a user clicks it, triggers the desktop client to execute an arbitrary local program. This flaw derives from CWE‑939, which describes untrusted input leading to arbitrary code execution. The consequence is that a malicious server can run any program on the client machine with the user’s privileges, potentially compromising confidentiality, integrity, and availability.

Affected Systems

The affected vendor is Mattermost; the product is the Mattermost Desktop App. All releases through 6.0, including the 6.2.0 build, and the 5.2.13.0 build are vulnerable. The advisory recommends updating to any supported release of 6.1.0, 6.0.3.0, 5.13.3.0, or higher to remove the flaw.

Risk and Exploitability

The CVSS score of 7.6 indicates a high severity vulnerability. The EPSS score is below 1 %, implying a very low current exploitation probability, and the vulnerability is not listed in the CISA KEV catalog. The attack vector is remote, requiring a compromised Mattermost server to embed a malicious help‑menu link. The user must click the link; no additional authentication or privilege escalation is necessary beyond the existing user session. If the link is triggered, any executable specified in the URL is launched with the client’s user rights, providing the attacker full control over the affected machine.

Generated by OpenCVE AI on April 18, 2026 at 12:07 UTC.

Remediation

Vendor Solution

Update Mattermost Desktop App to versions 6.1.0, 6.0.3.0, 5.13.3.0 or higher.


OpenCVE Recommended Actions

  • Update Mattermost Desktop App to version 6.1.0, 6.0.3.0, 5.13.3.0, or any newer release.
  • If an immediate patch is not feasible, disable the Help menu or block the opening of external links until a patched client is in use.
  • Configure client or system policy to validate or strip untrusted help‑menu URLs before execution, ensuring only trusted protocols are allowed.

Generated by OpenCVE AI on April 18, 2026 at 12:07 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

References
History

Mon, 23 Mar 2026 17:30:00 +0000

Type Values Removed Values Added
First Time appeared Mattermost mattermost Desktop
CPEs cpe:2.3:a:mattermost:mattermost_desktop:*:*:*:*:*:*:*:*
Vendors & Products Mattermost mattermost Desktop

Tue, 17 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 17 Feb 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Mattermost
Mattermost mattermost
Vendors & Products Mattermost
Mattermost mattermost

Mon, 16 Feb 2026 12:30:00 +0000

Type Values Removed Values Added
Description Mattermost Desktop App versions <=6.0 6.2.0 5.2.13.0 fail to validate help links which allows a malicious Mattermost server to execute arbitrary executables on a user’s system via the user clicking on certain items in the Help menu Mattermost Advisory ID: MMSA-2026-00577
Title Arbitrary application execution via unvalidated server-controlled URLs in Help menu
Weaknesses CWE-939
References
Metrics cvssV3_1

{'score': 7.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:L'}


Subscriptions

Mattermost Mattermost Mattermost Desktop
cve-icon MITRE

Status: PUBLISHED

Assigner: Mattermost

Published:

Updated: 2026-02-17T17:05:58.569Z

Reserved: 2026-01-16T16:24:48.693Z

Link: CVE-2026-1046

cve-icon Vulnrichment

Updated: 2026-02-17T16:42:13.057Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-16T13:16:00.793

Modified: 2026-03-23T17:27:17.083

Link: CVE-2026-1046

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T12:15:15Z

Weaknesses