Description
Mattermost Plugins versions <=2.1.3.0 fail to limit the request body size on the {{/changes}} webhook endpoint which allows an authenticated attacker to cause memory exhaustion and denial of service via sending an oversized JSON payload. Mattermost Advisory ID: MMSA-2026-00611
Published: 2026-04-09
Score: 3.7 Low
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service via memory exhaustion
Action: Patch immediately
AI Analysis

Impact

The vulnerability is an unbounded request body read on the MS Teams Plugin {{/changes}} webhook endpoint, allowing an authenticated attacker to send an oversized JSON payload that consumes memory and causes the system to become unresponsive. The primary impact is a denial of service as the plugin processes large inputs and exhausts server memory, potentially affecting availability for all users of the application. This flaw maps to the unbounded resource setting weakness CWE-770.

Affected Systems

Mattermost plugins with versions 2.1.3.0 or earlier are vulnerable. The affected component is the MS Teams Plugin used within Mattermost, specifically the {{/changes}} webhook endpoint that accepts JSON payloads from authenticated users. An attacker must have legitimate authentication to the Mattermost instance to trigger the flaw; no anonymous exploitation path exists as described.

Risk and Exploitability

The CVSS score of 3.7 classifies the flaw as low to moderate severity, and it is not listed in the CISA KEV catalog, indicating no known active exploitation. The EPSS score is not available, so the current exploit probability cannot be quantified. Based on the description, the attack vector is likely an authenticated request to the vulnerable webhook; the attacker must already have access to the system and can induce a denial of service through crafted payloads. Without further information on attack tooling or widespread vulnerability, the risk remains primarily an internal service interruption risk rather than a high‑impact breach.

Generated by OpenCVE AI on April 9, 2026 at 11:20 UTC.

Remediation

Vendor Solution

Update Mattermost Plugins to versions 2.3.2.0 or higher.


OpenCVE Recommended Actions

  • Update Mattermost Plugins to version 2.3.2.0 or higher.

Generated by OpenCVE AI on April 9, 2026 at 11:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-5rfv-h47g-xj42 Mattermost MS Teams plugin doesn't limit the request body size on the /changes webhook endpoint
References
History

Fri, 17 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:mattermost:mattermost:*:*:*:*:*:*:*:*

Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Mattermost
Mattermost mattermost
Vendors & Products Mattermost
Mattermost mattermost

Thu, 09 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 09 Apr 2026 10:30:00 +0000

Type Values Removed Values Added
Description Mattermost Plugins versions <=2.1.3.0 fail to limit the request body size on the {{/changes}} webhook endpoint which allows an authenticated attacker to cause memory exhaustion and denial of service via sending an oversized JSON payload. Mattermost Advisory ID: MMSA-2026-00611
Title Unbounded Request Body Read in MS Teams Plugin {{/changes}} Webhook Endpoint
Weaknesses CWE-770
References
Metrics cvssV3_1

{'score': 3.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L'}


Subscriptions

Mattermost Mattermost
cve-icon MITRE

Status: PUBLISHED

Assigner: Mattermost

Published:

Updated: 2026-04-09T11:44:35.023Z

Reserved: 2026-02-11T20:56:06.566Z

Link: CVE-2026-24661

cve-icon Vulnrichment

Updated: 2026-04-09T11:44:30.263Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-09T11:16:21.047

Modified: 2026-04-17T20:31:03.873

Link: CVE-2026-24661

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:32:55Z

Weaknesses