Subscriptions
No data.
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
Update Mattermost to versions 11.5.0, 11.4.1, 11.3.2, 11.2.4, 10.11.12 or higher.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://mattermost.com/security-updates |
|
Thu, 26 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 26 Mar 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Mattermost versions 11.4.x <= 11.4.0, 11.3.x <= 11.3.1, 11.2.x <= 11.2.3, 10.11.x <= 10.11.11 fail to validate Advanced Logging file target paths which allows system administrators to read arbitrary host files via malicious AdvancedLoggingJSON configuration in support packet generation. Mattermost Advisory ID: MMSA-2025-00562 | |
| Title | Arbitrary File Read via Advanced Logging Support Packet | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Mattermost
Published:
Updated: 2026-03-26T16:51:15.488Z
Reserved: 2026-02-24T10:55:16.031Z
Link: CVE-2026-3112
Updated: 2026-03-26T16:51:12.964Z
Status : Received
Published: 2026-03-26T17:16:42.123
Modified: 2026-03-26T17:16:42.123
Link: CVE-2026-3112
No data.
OpenCVE Enrichment
No data.