Description
Mattermost versions 10.11.x <= 10.11.9 fail to properly validate channel membership at the time of data retrieval which allows a deactivated user to learn team names they should not have access to via a race condition in the /common_teams API endpoint.. Mattermost Advisory ID: MMSA-2025-00549
Published: 2026-02-13
Score: 3.1 Low
EPSS: < 1% Very Low
KEV: No
Impact: Information disclosure through a race condition in the /common_teams API that allows a deactivated user to discover unauthorized team names.
Action: Patch
AI Analysis

Impact

The vulnerability resides in Mattermost server versions 10.11.x from 10.11.0 to 10.11.9, where the /common_teams endpoint fails to validate channel membership at the time data is retrieved. A deactivated user can exploit a race condition to learn the names of teams they should not be able to see, resulting in unauthorized disclosure of sensitive team information. The weakness corresponds to CWE‑367 and carries a low CVSS score of 3.1.

Affected Systems

Sponsors: Mattermost, product: Mattermost server. Affected versions are 10.11.0 through 10.11.9 inclusive; the vendor recommends upgrading to 10.11.10 or higher, or to 11.3.0 or later.

Risk and Exploitability

The CVSS base score of 3.1 and an EPSS rate of less than 1% indicate a low likelihood of exploitation. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. Exploitation would require an attacker to have a deactivated account that can still call the /common_teams API, then repeatedly invoke the endpoint during the presence of a race condition; based on the description, the attack vector is likely remote API usage by a compromised or malicious deactivated user.

Generated by OpenCVE AI on April 17, 2026 at 19:54 UTC.

Remediation

Vendor Solution

Update Mattermost to versions 11.3.0, 10.11.10 or higher.


OpenCVE Recommended Actions

  • Apply the vendor‑recommended patch by upgrading Mattermost to version 10.11.10 or higher, or to 11.3.0 or later.
  • If immediate upgrading is not feasible, restrict the /common_teams API endpoint so that deactivated users cannot access it, for example by configuring access policies or using a firewall rule.
  • Monitor system logs for repeated requests to /common_teams from deactivated accounts and investigate any anomalies.

Generated by OpenCVE AI on April 17, 2026 at 19:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-2xf7-hmf6-p64j Mattermost doesn't properly validate channel membership at the time of data retrieval
References
History

Mon, 23 Feb 2026 16:00:00 +0000

Type Values Removed Values Added
First Time appeared Mattermost mattermost Server
CPEs cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*
Vendors & Products Mattermost mattermost Server

Fri, 13 Feb 2026 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Mattermost
Mattermost mattermost
Vendors & Products Mattermost
Mattermost mattermost

Fri, 13 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 13 Feb 2026 10:45:00 +0000

Type Values Removed Values Added
Description Mattermost versions 10.11.x <= 10.11.9 fail to properly validate channel membership at the time of data retrieval which allows a deactivated user to learn team names they should not have access to via a race condition in the /common_teams API endpoint.. Mattermost Advisory ID: MMSA-2025-00549
Title Time-of-check time-of-use vulnerability in common teams API
Weaknesses CWE-367
References
Metrics cvssV3_1

{'score': 3.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Mattermost Mattermost Mattermost Server
cve-icon MITRE

Status: PUBLISHED

Assigner: Mattermost

Published:

Updated: 2026-02-13T17:02:25.985Z

Reserved: 2026-01-15T11:34:00.225Z

Link: CVE-2026-20796

cve-icon Vulnrichment

Updated: 2026-02-13T17:01:43.299Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-13T11:16:10.280

Modified: 2026-02-23T15:53:11.073

Link: CVE-2026-20796

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T20:00:09Z

Weaknesses