Impact
Mattermost versions 10.11.x through 10.11.12 do not confirm that users belong to the Connected Workspace that owns them. This oversight allows a malicious remote server that has been provisioned to connect to the target via the Connected Workspaces feature to send API calls that change the displayed status of local users. The impact is a compromise of the integrity of user status information; confidentiality and code execution are not affected by this flaw. The potential for social‑engineering attacks is inferred from the ability to alter user status, but the CVE description does not explicitly state that such attacks are feasible.
Affected Systems
The affected software is Mattermost. Vulnerable versions are 10.11.0 through 10.11.12. Updated releases 10.11.13 or later, and any 11.5.0 or newer, contain the fix.
Risk and Exploitability
The CVSS score of 2.7 indicates low severity. No EPSS data is available, and the flaw is not listed in the CISA KEV catalog. The attack requires a malicious remote server that has been provisioned to connect to the target through the Connected Workspaces API; no privileged local user or local code execution is necessary. Because the flaw permits only status modification, the operational impact is limited, and exploitation is unlikely to lead to broader system compromise.
OpenCVE Enrichment