Description
Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2, 10.11.x <= 10.11.10 fail to filter invite IDs based on user permissions, which allows regular users to bypass access control restrictions and register unauthorized accounts via leaked invite IDs during team creation.. Mattermost Advisory ID: MMSA-2025-00565
Published: 2026-03-16
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Access Control Bypass allowing creation of user accounts via exposed invite IDs
Action: Immediate Patch
AI Analysis

Impact

Mattermost server versions that do not filter invite IDs according to user permissions allow any logged‑in user to supply a leaked invite token and create a new account that is not intended to belong to a specific team. This flaw provides an unauthorized user with the ability to add themselves or others to teams, thereby compromising the integrity and confidentiality of team membership. The weakness is classified as CWE-862, Improper Authorization.

Affected Systems

All Mattermost Server releases with versions 11.3.x up to and including 11.3.0, 11.2.x up to and including 11.2.2, and 10.11.x up to and including 10.11.10 are affected. The vendor recommends upgrading to any release newer than these, such as 11.4.0, 11.3.1, 11.2.3, or 10.11.11.

Risk and Exploitability

The CVSS score of 4.3 indicates a moderate severity, while the EPSS score of less than 1% suggests that real‑world exploitation is unlikely at this time. The vulnerability is not listed in the CISA KEV catalog. Exploitation does not require elevated privileges beyond a normal user account; an attacker who can access a valid invite ID can directly create an unauthorized account during team creation. Although the risk is moderate, the potential to manipulate team composition can be critical for organizations with strict access controls.

Generated by OpenCVE AI on March 18, 2026 at 18:53 UTC.

Remediation

Vendor Solution

Update Mattermost to versions 11.4.0, 11.3.1, 11.2.3, 10.11.11 or higher.


OpenCVE Recommended Actions

  • Apply the vendor update to Mattermost Server version 11.4.0, 11.3.1, 11.2.3, 10.11.11, or any later release
  • Verify that the updated version is running by checking the server version information

Generated by OpenCVE AI on March 18, 2026 at 18:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-fx49-m253-27jj Mattermost fails to filter invite IDs based on user permissions
References
History

Mon, 30 Mar 2026 07:15:00 +0000

Type Values Removed Values Added
First Time appeared Mattermost mattermost
Mattermost server
Vendors & Products Mattermost mattermost
Mattermost server

Wed, 18 Mar 2026 17:45:00 +0000

Type Values Removed Values Added
First Time appeared Mattermost
Mattermost mattermost Server
CPEs cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*
Vendors & Products Mattermost
Mattermost mattermost Server

Mon, 16 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 11:30:00 +0000

Type Values Removed Values Added
Description Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2, 10.11.x <= 10.11.10 fail to filter invite IDs based on user permissions, which allows regular users to bypass access control restrictions and register unauthorized accounts via leaked invite IDs during team creation.. Mattermost Advisory ID: MMSA-2025-00565
Title Unauthorized access to invite ID during team creation
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Mattermost Mattermost Mattermost Server Server
cve-icon MITRE

Status: PUBLISHED

Assigner: Mattermost

Published:

Updated: 2026-03-16T13:49:58.332Z

Reserved: 2026-02-13T11:32:02.091Z

Link: CVE-2026-2463

cve-icon Vulnrichment

Updated: 2026-03-16T13:44:19.874Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-16T14:19:30.193

Modified: 2026-03-18T17:43:26.553

Link: CVE-2026-2463

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-30T07:02:47Z

Weaknesses