Description
Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2, 10.11.x <= 10.11.10 fail to use consistent error responses when handling the /mute command which allows an authenticated team member to enumerate private channels they are not authorized to know about via differing error messages for nonexistent versus private channels. Mattermost Advisory ID: MMSA-2026-00588
Published: 2026-03-16
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure
Action: Immediate Patch
AI Analysis

Impact

Mattermost versions 11.3.0, 11.2.0–11.2.2 and 10.11.0–10.11.10 fail to use consistent error responses when processing the /mute slash command. This flaw allows an authenticated team member to distinguish between channels that do not exist and channels that are private and inaccessible, thereby enumerating the existence of private channels. The weakness is an information disclosure flaw (CWE‑203).

Affected Systems

The vulnerability affects Mattermost server deployments running any version 11.3.x that is less than or equal to 11.3.0, any 11.2.x version up to 11.2.2 inclusive, or any 10.11.x version up to 10.11.10 inclusive; newer releases such as 11.4.0, 11.3.1, 11.2.3, and 10.11.11 are not affected.

Risk and Exploitability

The CVSS score of 4.3 indicates moderate severity. The EPSS score is below 1 %, suggesting a low likelihood of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires an authenticated user in the same Mattermost team and releases differing error messages depending on channel existence, so the attack vector is internal. No remote or unauthenticated exploitation is described.

Generated by OpenCVE AI on March 18, 2026 at 15:38 UTC.

Remediation

Vendor Solution

Update Mattermost to versions 11.4.0, 11.3.1, 11.2.3, 10.11.11 or higher.


OpenCVE Recommended Actions

  • Apply the vendor‑supplied patch by upgrading to Mattermost 11.4.0, 11.3.1, 11.2.3, or 10.11.11 or newer.
  • Verify that the upgrade succeeded by checking the running Mattermost version.
  • If an immediate upgrade is not possible, plan the update for the next maintenance window and monitor Mattermost security advisories for further guidance.

Generated by OpenCVE AI on March 18, 2026 at 15:38 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-5mr9-crcg-8wh2 Mattermost fails to use consistent error responses when handling the /mute command
References
History

Wed, 18 Mar 2026 14:00:00 +0000

Type Values Removed Values Added
First Time appeared Mattermost mattermost Server
CPEs cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*
Vendors & Products Mattermost mattermost Server

Tue, 17 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Mattermost
Mattermost mattermost
Vendors & Products Mattermost
Mattermost mattermost

Mon, 16 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Description Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2, 10.11.x <= 10.11.10 fail to use consistent error responses when handling the /mute command which allows an authenticated team member to enumerate private channels they are not authorized to know about via differing error messages for nonexistent versus private channels. Mattermost Advisory ID: MMSA-2026-00588
Title Private channel enumeration via /mute slash command
Weaknesses CWE-203
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Mattermost Mattermost Mattermost Server
cve-icon MITRE

Status: PUBLISHED

Assigner: Mattermost

Published:

Updated: 2026-03-16T18:39:14.064Z

Reserved: 2026-02-13T10:01:31.918Z

Link: CVE-2026-21386

cve-icon Vulnrichment

Updated: 2026-03-16T18:39:06.523Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-16T15:16:20.927

Modified: 2026-03-18T13:53:15.357

Link: CVE-2026-21386

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-24T10:44:19Z

Weaknesses