Impact
Mattermost Server releases up to 11.4.0, 11.3.1, 11.2.3, and 10.11.11 do not rate‑limit login requests, allowing an unauthenticated attacker to send 100+ parallel HTTP/2 single‑packet login requests. This overwhelms the server and causes a crash with automatic restart, effectively denying service to all users and administrators. The vulnerability corresponds to CWE‑400, indicating a resource‑exhaustion weakness.
Affected Systems
The affected products are Mattermost Server versions 11.4.x (≤11.4.0), 11.3.x (≤11.3.1), 11.2.x (≤11.2.3), and 10.11.x (≤10.11.11). Any installation running these releases, regardless of operating system or deployment model, is susceptible.
Risk and Exploitability
The CVSS base score of 4.3 classifies the issue as low severity, and the EPSS score of less than 1% indicates a very low likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog. An attacker only needs unauthenticated HTTP/2 traffic to the exposed login endpoint; no privileged access is required. The attack can be executed from any network that can reach the login endpoint, and the impact is the denial of service of the Mattermost service.
OpenCVE Enrichment
Github GHSA