Description
Mattermost Mobile Apps versions <=2.37 11.4 2.0.37 11.0.4 11.1.3 11.3.2 10.11.11.0 fail to properly validate the SSO authentication callback origin which allows an attacker controlling a malicious Mattermost server to steal user credentials for a legitimate Mattermost server via relaying the SSO code exchange flow through the mobile application. Mattermost Advisory ID: MMSA-2025-00564
Published: 2026-05-21
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability exists because the mobile application does not validate the origin of the SSO authentication callback correctly. When a malicious Mattermost server is used, the application accepts the callback and processes the code exchange, allowing the attacker to obtain user credentials that belong to a legitimate Mattermost installation. The weakness is a flaw in cross‑site request forgery handling, as indexed by CWE‑352, and results in unauthorized disclosure of login secrets from the mobile client back to the attacker.

Affected Systems

Mattermost Mobile Apps, specifically all versions that are equal to or less than 2.37, 11.4, 2.0.37, 11.0.4, 11.1.3, 11.3.2, or 10.11.11.0. The affected product is the Mattermost mobile client for iOS and Android, with any build that includes these version numbers.

Risk and Exploitability

The CVSS score of 6.1 indicates moderate severity, and the vulnerability is not listed in the CISA KEV catalog. Because no EPSS score is available, the known exploitation probability cannot be quantified, but the lack of origin checks allows an attacker who controls a fake Mattermost server to perform the SSO code exchange flow through a user’s mobile device. The necessary condition for exploitation is that the user logs in via the mobile app and trusts the malicious server, making this risk primarily relevant to environments where users authenticate through the mobile client and could be targeted by phishing or compromised server infrastructure.

Generated by OpenCVE AI on May 21, 2026 at 10:22 UTC.

Remediation

Vendor Solution

Update Mattermost Mobile Apps to versions 2.38.0, 11.5.0, 2.37.1.0, 11.4.1, 11.3.2, 11.2.4, 10.11.12 or higher.


OpenCVE Recommended Actions

  • Apply the latest Mattermost Mobile App updates—version 2.38.0, 11.5.0, 2.37.1.0, 11.4.1, 11.3.2, 11.2.4, or 10.11.12, or any newer release—to fix the origin validation bug.
  • In the interim, configure the Mattermost server to enforce strict origin checks on the SSO callback endpoint and reject any callbacks that originate from untrusted domains; this disables the flow that the vulnerability exploits.
  • Regularly review authentication logs for unauthorized SSO callbacks or abnormal origin headers, and disable the SSO callback feature if custom validation cannot be applied immediately.

Generated by OpenCVE AI on May 21, 2026 at 10:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

References
History

Thu, 21 May 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 21 May 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Mattermost
Mattermost mattermost
Vendors & Products Mattermost
Mattermost mattermost

Thu, 21 May 2026 09:00:00 +0000

Type Values Removed Values Added
Description Mattermost Mobile Apps versions <=2.37 11.4 2.0.37 11.0.4 11.1.3 11.3.2 10.11.11.0 fail to properly validate the SSO authentication callback origin which allows an attacker controlling a malicious Mattermost server to steal user credentials for a legitimate Mattermost server via relaying the SSO code exchange flow through the mobile application. Mattermost Advisory ID: MMSA-2025-00564
Title Mobile SSO authentication flow allows credential theft via malicious server
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N'}


Subscriptions

Mattermost Mattermost
cve-icon MITRE

Status: PUBLISHED

Assigner: Mattermost

Published:

Updated: 2026-05-21T12:39:30.334Z

Reserved: 2026-02-23T22:07:32.793Z

Link: CVE-2026-22880

cve-icon Vulnrichment

Updated: 2026-05-21T12:39:16.976Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-21T09:16:26.510

Modified: 2026-05-21T15:26:35.653

Link: CVE-2026-22880

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-21T10:30:08Z

Weaknesses