Subscriptions
No data.
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
Update Mattermost to versions 11.5.0, 11.2.3, 10.11.11, 11.4.1, 11.3.2 or higher.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://mattermost.com/security-updates |
|
Thu, 26 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 26 Mar 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Mattermost versions 11.2.x <= 11.2.2, 10.11.x <= 10.11.10, 11.4.x <= 11.4.0, 11.3.x <= 11.3.1 fail to sanitize user-controlled post content in the mmctl commands terminal output which allows attackers to manipulate administrator terminals via crafted messages containing ANSI and OSC escape sequences that enable screen manipulation, fake prompts, and clipboard hijacking.. Mattermost Advisory ID: MMSA-2026-00599 | |
| Title | Terminal Escape Injection in mmctl Report Posts Command | |
| Weaknesses | CWE-150 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Mattermost
Published:
Updated: 2026-03-26T17:51:15.326Z
Reserved: 2026-02-24T10:50:40.507Z
Link: CVE-2026-3108
Updated: 2026-03-26T17:47:48.522Z
Status : Received
Published: 2026-03-26T17:16:41.797
Modified: 2026-03-26T17:16:41.797
Link: CVE-2026-3108
No data.
OpenCVE Enrichment
No data.