Description
Mattermost Desktop App versions <=5.13.3 fail to attach listeners restricting navigation to external sites within the Mattermost app which allows a malicious server to expose preload script functionality to untrusted servers via having a user open an external link in their Mattermost server. Mattermost Advisory ID: MMSA-2026-00596
Published: 2026-03-02
Score: 4.6 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Execution of malicious scripts via preload
Action: Patch
AI Analysis

Impact

The Mattermost Desktop App up to version 5.13.3 does not enforce navigation restrictions for external links. When a user opens a link that points to an untrusted site, the app allows the site to supply a preload script, which runs with the full privileges of the desktop environment. This flaw could enable an attacker to execute arbitrary code in the user’s local machine, leading to disclosure of sensitive data, credential theft, or further compromise of the system. The weakness corresponds to improper restriction of native functionality (CWE‑829).

Affected Systems

Affected by Mattermost. The Mattermost Desktop App versions 5.13.3 and earlier are vulnerable. The application runs on all platforms supported by the desktop client. No other vendors or products are listed. Updates or patches are not available for older or unsupported releases.

Risk and Exploitability

The CVSS base score of 4.6 indicates moderate risk, and the EPSS score below 1 % suggests that the vulnerability is unlikely to be exploited broadly at this time. The flaw is not listed in CISA’s Known Exploited Vulnerabilities catalog, which further reflects a low exploitation probability. Attackers would need a legitimate Mattermost account and a user click on a malicious link to launch the preload script, so the vector relies on social engineering or compromised content. The impact is limited to the device executing the desktop client.

Generated by OpenCVE AI on April 16, 2026 at 14:34 UTC.

Remediation

Vendor Solution

Update Mattermost Desktop App to versions 5.13.4.0 or higher.


OpenCVE Recommended Actions

  • Update Mattermost Desktop App to version 5.13.4 or later.
  • Configure the desktop client or its settings to block navigation to external sites, thereby preventing the loading of external preload scripts.
  • Apply network or endpoint filtering to restrict access to untrusted domains from the desktop application.

Generated by OpenCVE AI on April 16, 2026 at 14:34 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

References
History

Thu, 05 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Mattermost mattermost Desktop
CPEs cpe:2.3:a:mattermost:mattermost_desktop:*:*:*:*:*:*:*:*
Vendors & Products Mattermost mattermost Desktop

Wed, 04 Mar 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Mattermost
Mattermost mattermost
Vendors & Products Mattermost
Mattermost mattermost

Mon, 02 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 02 Mar 2026 13:45:00 +0000

Type Values Removed Values Added
Description Mattermost Desktop App versions <=5.13.3 fail to attach listeners restricting navigation to external sites within the Mattermost app which allows a malicious server to expose preload script functionality to untrusted servers via having a user open an external link in their Mattermost server. Mattermost Advisory ID: MMSA-2026-00596
Title Mattermost allows external websites to open within the app, exposing preload functionality to non-trusted sites.
Weaknesses CWE-829
References
Metrics cvssV3_1

{'score': 4.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N'}


Subscriptions

Mattermost Mattermost Mattermost Desktop
cve-icon MITRE

Status: PUBLISHED

Assigner: Mattermost

Published:

Updated: 2026-03-02T14:58:30.546Z

Reserved: 2026-01-29T15:14:51.993Z

Link: CVE-2026-1628

cve-icon Vulnrichment

Updated: 2026-03-02T14:58:22.983Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-02T14:16:23.223

Modified: 2026-03-05T16:07:40.963

Link: CVE-2026-1628

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T14:45:25Z

Weaknesses