Description
Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2, 10.11.x <= 10.11.10 fail to canonicalize IPv4-mapped IPv6 addresses before reserved IP validation which allows an attacker to perform SSRF attacks against internal services via IPv4-mapped IPv6 literals (e.g., [::ffff:127.0.0.1]).. Mattermost Advisory ID: MMSA-2026-00585
Published: 2026-03-16
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SSRF Exploitation
Action: Apply Patch
AI Analysis

Impact

Mattermost Server versions prior to 11.4.0, 11.3.1, 11.2.3, 10.11.11 contain a server‑side request forgery (SSRF) flaw. The application does not fully canonicalize IPv4‑mapped IPv6 addresses before checking for reserved IP ranges. An attacker can supply a URL containing an IPv4‑mapped IPv6 literal such as [::ffff:127.0.0.1] to bypass the reserved‑IP filter and force the server to make requests to internal hosts. The flaw is categorized as CWE‑918 and could lead to unauthorized access to internal resources, though it does not provide arbitrary code execution. The attack is possible when the victim’s server resolves the supplied address, raising confidentiality and integrity risks for internal services.

Affected Systems

The vulnerability affects the Mattermost Server product from Mattermost. Affected versions are all releases in the 11.3.x series up to and including 11.3.0, all releases in the 11.2.x series up to and including 11.2.2, and all releases in the 10.11.x series up to and including 10.11.10. The issue is tracked by CPE: cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*

Risk and Exploitability

The CVSS base score for this vulnerability is 4.3, indicating moderate severity. The EPSS score is below 1%, suggesting a low probability of exploitation in the wild at this time. It is not listed in the CISA Known Exploited Vulnerabilities catalog. The attack vector is likely network‑directed, where an adversary crafts a malicious payload that includes an IPv4‑mapped IPv6 literal and triggers the server’s SSRF functionality. Because the flaw relies on incorrect address canonicalization, exploitation requires that the legitimate component of the server accepts user‑supplied URLs. The impact is limited to internal network access but could provide lateral movement if internal services are accessed.

Generated by OpenCVE AI on March 18, 2026 at 15:27 UTC.

Remediation

Vendor Solution

Update Mattermost to versions 11.4.0, 11.3.1, 11.2.3, 10.11.11 or higher.


OpenCVE Recommended Actions

  • Update Mattermost Server to version 11.4.0, 11.3.1, 11.2.3, or 10.11.11 or later.
  • If an immediate update is not possible, restrict the application’s ability to resolve or request IPv4‑mapped IPv6 addresses, such as by firewall rules or network configuration.
  • Verify that any user‑supplied URLs are fully validated and that IP canonicalization is performed before the request is sent.
  • Monitor application logs for unexpected SSRF activity and review internal network traffic for abnormal outbound requests.

Generated by OpenCVE AI on March 18, 2026 at 15:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-gqv7-j2j8-qmwq Mattermost fails to canonicalize IPv4-mapped IPv6 addresses before reserved IP validation
References
History

Wed, 18 Mar 2026 14:00:00 +0000

Type Values Removed Values Added
First Time appeared Mattermost mattermost Server
CPEs cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*
Vendors & Products Mattermost mattermost Server

Tue, 17 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Mattermost
Mattermost mattermost
Vendors & Products Mattermost
Mattermost mattermost

Mon, 16 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Description Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2, 10.11.x <= 10.11.10 fail to canonicalize IPv4-mapped IPv6 addresses before reserved IP validation which allows an attacker to perform SSRF attacks against internal services via IPv4-mapped IPv6 literals (e.g., [::ffff:127.0.0.1]).. Mattermost Advisory ID: MMSA-2026-00585
Title SSRF bypass via IPv4-mapped IPv6 literals
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Mattermost Mattermost Mattermost Server
cve-icon MITRE

Status: PUBLISHED

Assigner: Mattermost

Published:

Updated: 2026-03-16T18:38:07.619Z

Reserved: 2026-02-13T10:45:36.473Z

Link: CVE-2026-2455

cve-icon Vulnrichment

Updated: 2026-03-16T18:38:00.408Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-16T15:16:22.277

Modified: 2026-03-18T13:55:00.147

Link: CVE-2026-2455

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-24T10:44:18Z

Weaknesses