Description
Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2, 10.11.x <= 10.11.10 fail to properly validate User-Agent header tokens which allows an authenticated attacker to cause a request panic via a specially crafted User-Agent header. Mattermost Advisory ID: MMSA-2026-00586
Published: 2026-03-16
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Patch
AI Analysis

Impact

The vulnerability is a denial‑of‑service (DoS) caused by a failure to properly validate User‑Agent header tokens. An authenticated attacker can trigger a request panic by sending a specially crafted User‑Agent header, leading to service interruption. The underlying weakness is classified as CWE‑1287.

Affected Systems

Affected systems include Mattermost server versions 11.3.x up to 11.3.0, 11.2.x up to 11.2.2, and 10.11.x up to 10.11.10. Any installation running these versions with authenticated user access is vulnerable.

Risk and Exploitability

The CVSS score is 4.3, indicating low severity, and the EPSS score is below 1%, meaning exploitation is unlikely. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires an authenticated user, so a legitimate account with permissions to make a request is needed. Although the risk is low, patching is recommended to prevent potential service interruption.

Generated by OpenCVE AI on March 18, 2026 at 19:38 UTC.

Remediation

Vendor Solution

Update Mattermost to versions 11.4.0, 11.3.1, 11.2.3, 10.11.11 or higher.


OpenCVE Recommended Actions

  • Update Mattermost to versions 11.4.0, 11.3.1, 11.2.3, 10.11.11 or higher.
  • Verify the patch by testing the server with a malicious User‑Agent header to ensure the request no longer causes a panic.

Generated by OpenCVE AI on March 18, 2026 at 19:38 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-2v3w-6g35-5f9v Mattermost fails to properly validate User-Agent header tokens
References
History

Mon, 30 Mar 2026 07:15:00 +0000

Type Values Removed Values Added
First Time appeared Mattermost mattermost
Vendors & Products Mattermost mattermost

Wed, 18 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Mattermost
Mattermost mattermost Server
CPEs cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*
Vendors & Products Mattermost
Mattermost mattermost Server

Mon, 16 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
Description Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2, 10.11.x <= 10.11.10 fail to properly validate User-Agent header tokens which allows an authenticated attacker to cause a request panic via a specially crafted User-Agent header. Mattermost Advisory ID: MMSA-2026-00586
Title Denial of service via malformed User-Agent header in getBrowserVersion
Weaknesses CWE-1287
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}


Subscriptions

Mattermost Mattermost Mattermost Server
cve-icon MITRE

Status: PUBLISHED

Assigner: Mattermost

Published:

Updated: 2026-03-16T13:49:55.332Z

Reserved: 2026-02-13T10:01:31.949Z

Link: CVE-2026-25783

cve-icon Vulnrichment

Updated: 2026-03-16T13:43:39.912Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-16T14:18:23.593

Modified: 2026-03-18T18:11:16.290

Link: CVE-2026-25783

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-30T07:02:28Z

Weaknesses