Description
Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2, 10.11.x <= 10.11.10 fail to restrict plugin installation on CI test instances with default admin credentials which allows an unauthenticated attacker to achieve remote code execution and exfiltrate sensitive configuration data including AWS and SMTP credentials via uploading a malicious plugin after changing the import directory. Mattermost Advisory ID: MMSA-2025-00528
Published: 2026-03-16
Score: 6.6 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Patch Now
AI Analysis

Impact

Mattermost server versions 11.3.x (<=11.3.0), 11.2.x (<=11.2.2), and 10.11.x (<=10.11.10) fail to restrict plugin installation on Continuous Integration test instances that use default administrator credentials. The vulnerability allows an unauthenticated attacker to upload a malicious plugin after changing the import directory, which results in remote code execution and the exfiltration of sensitive configuration data such as AWS and SMTP credentials. The weakness is identified as CWE-863, indicating unauthorized access to privileged code execution paths.

Affected Systems

Affected systems are Mattermost servers running the identified vulnerable versions. The product affected is the Mattermost server, and specific affected versions are 11.3.x up to and including 11.3.0, 11.2.x up to and including 11.2.2, and 10.11.x up to and including 10.11.10.

Risk and Exploitability

The CVSS score of 6.6 reflects a moderate severity level, and the EPSS score of less than 1% suggests a low likelihood of exploitation at present. The vulnerability is not listed in the CISA KEV catalog, indicating no known widespread exploitation. The attack vector is inferred to be unauthenticated, as the description states that an attacker need only default admin credentials on a CI test instance to deploy the malicious plugin.

Generated by OpenCVE AI on March 18, 2026 at 19:27 UTC.

Remediation

Vendor Solution

Update Mattermost to versions 11.4.0, 11.3.1, 11.2.3, 10.11.11 or higher.


OpenCVE Recommended Actions

  • Apply the official Mattermost patch to a version of 11.4.0, 11.3.1, 11.2.3, 10.11.11 or newer.
  • Disable or restrict plugin upload capability on CI test instances to prevent unauthorized installations.
  • Change default admin credentials and enforce strong password policies on all Mattermost instances.
  • Audit existing plugins for malicious code and validate their integrity before deployment.

Generated by OpenCVE AI on March 18, 2026 at 19:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

References
History

Mon, 30 Mar 2026 07:15:00 +0000

Type Values Removed Values Added
First Time appeared Mattermost server
Vendors & Products Mattermost server

Wed, 18 Mar 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Mattermost
Mattermost mattermost Server
CPEs cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*
Vendors & Products Mattermost
Mattermost mattermost Server

Mon, 16 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
Description Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2, 10.11.x <= 10.11.10 fail to restrict plugin installation on CI test instances with default admin credentials which allows an unauthenticated attacker to achieve remote code execution and exfiltrate sensitive configuration data including AWS and SMTP credentials via uploading a malicious plugin after changing the import directory. Mattermost Advisory ID: MMSA-2025-00528
Title Admin RCE via Malicious Plugin Upload on CI Test Instances
Weaknesses CWE-863
References
Metrics cvssV3_1

{'score': 6.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L'}


Subscriptions

Mattermost Mattermost Server Server
cve-icon MITRE

Status: PUBLISHED

Assigner: Mattermost

Published:

Updated: 2026-03-17T03:55:27.849Z

Reserved: 2026-02-13T11:21:17.796Z

Link: CVE-2026-2462

cve-icon Vulnrichment

Updated: 2026-03-16T13:43:44.074Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-16T14:19:30.010

Modified: 2026-03-18T18:31:45.873

Link: CVE-2026-2462

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-30T07:02:31Z

Weaknesses