Description
Mattermost versions 11.4.x <= 11.4.0, 11.3.x <= 11.3.1, 11.2.x <= 11.2.3, 10.11.x <= 10.11.11 fail to validate Advanced Logging file target paths which allows system administrators to read arbitrary host files via malicious AdvancedLoggingJSON configuration in support packet generation. Mattermost Advisory ID: MMSA-2025-00562
Published: 2026-03-26
Score: 6.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary File Read
Action: Immediate Patch
AI Analysis

Impact

Mattermost server versions up to 11.4.0, 11.3.1, 11.2.3, and 10.11.11 allow a constructed AdvancedLoggingJSON configuration to specify any file target path during support packet generation. The application does not validate these paths, enabling an attacker to read arbitrary files on the host. The resulting confidentiality breach can expose system credentials, configuration files, or other sensitive information, potentially compromising the entire host environment if the attacker can execute additional actions.

Affected Systems

Vulnerable Mattermost installations include server releases in the 11.4.x, 11.3.x, 11.2.x, and 10.11.x series with affected build numbers up to 11.4.0, 11.3.1, 11.2.3, and 10.11.11 respectively. Administrators using these versions should check their deployment against the affected builds and plan an update accordingly.

Risk and Exploitability

The CVSS base score of 6.8 reflects medium severity with a moderate impact on confidentiality. An EPSS score below 1% indicates a low probability of widespread exploitation at present, and the vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. Exploitation requires control over the Advanced Logging configuration, which is typically limited to administrators or privileged users. Without such access, a public attacker is unlikely to exploit the flaw, but internal threats or compromised administrators pose a significant risk.

Generated by OpenCVE AI on March 30, 2026 at 20:29 UTC.

Remediation

Vendor Solution

Update Mattermost to versions 11.5.0, 11.4.1, 11.3.2, 11.2.4, 10.11.12 or higher.


OpenCVE Recommended Actions

  • Upgrade Mattermost to a fixed release – at least v11.5.0, 11.4.1, 11.3.2, 11.2.4, or 10.11.12 or later.

Generated by OpenCVE AI on March 30, 2026 at 20:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-3mw5-466q-295q Mattermost allows system administrators to read arbitrary host files via malicious AdvancedLoggingJSON configuration
References
History

Mon, 30 Mar 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Mattermost mattermost Server
CPEs cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*
cpe:2.3:a:mattermost:mattermost_server:11.4.0:*:*:*:*:*:*:*
Vendors & Products Mattermost mattermost Server

Fri, 27 Mar 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Mattermost
Mattermost mattermost
Vendors & Products Mattermost
Mattermost mattermost

Thu, 26 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Mar 2026 16:45:00 +0000

Type Values Removed Values Added
Description Mattermost versions 11.4.x <= 11.4.0, 11.3.x <= 11.3.1, 11.2.x <= 11.2.3, 10.11.x <= 10.11.11 fail to validate Advanced Logging file target paths which allows system administrators to read arbitrary host files via malicious AdvancedLoggingJSON configuration in support packet generation. Mattermost Advisory ID: MMSA-2025-00562
Title Arbitrary File Read via Advanced Logging Support Packet
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 6.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N'}


Subscriptions

Mattermost Mattermost Mattermost Server
cve-icon MITRE

Status: PUBLISHED

Assigner: Mattermost

Published:

Updated: 2026-03-26T16:51:15.488Z

Reserved: 2026-02-24T10:55:16.031Z

Link: CVE-2026-3112

cve-icon Vulnrichment

Updated: 2026-03-26T16:51:12.964Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-26T17:16:42.123

Modified: 2026-03-30T19:42:39.833

Link: CVE-2026-3112

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-30T20:57:40Z

Weaknesses