Description
Mattermost versions 11.4.x <= 11.4.0, 11.3.x <= 11.3.1, 11.2.x <= 11.2.3, 10.11.x <= 10.11.11 fail to set permissions on downloaded bulk export which allows other local users on the server to be able to read contents of the bulk export.. Mattermost Advisory ID: MMSA-2026-00593
Published: 2026-03-26
Score: 5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Local information disclosure via exported bulk files
Action: Apply Patch
AI Analysis

Impact

A flaw in Mattermost’s mmctl export download command fails to set restrictive file permissions on exported bulk data. As a result, users who are not the file owner can read the contents of the export, potentially exposing private messages, files, and user data. The issue maps to CWE‑732, which addresses wrong file‑system permissions.

Affected Systems

Mattermost server versions 10.11.x up to and including 10.11.11, 11.2.x up to 11.2.3, 11.3.x up to 11.3.1, and 11.4.x up to 11.4.0 are vulnerable. The vulnerability affects all installations running any of these releases, regardless of deployment scale. There is no indication that later releases are impacted.

Risk and Exploitability

The vulnerability carries a CVSS score of 5.0, indicating a medium impact. EPSS scoring suggests the probability of exploitation is below 1 percent, and the weakness is not listed as a known exploited vulnerability. However, any local user with access to run the export command can read the exported files, and the lack of file‑ownership restrictions may enable the disclosure or tampering of sensitive data.

Generated by OpenCVE AI on March 30, 2026 at 20:30 UTC.

Remediation

Vendor Solution

Update Mattermost to versions 11.5.0, 11.4.1, 11.3.2, 11.2.4, 10.11.12 or higher.


OpenCVE Recommended Actions

  • Upgrade Mattermost to version 11.5.0, 11.4.1, 11.3.2, 11.2.4, 10.11.12 or later
  • If an upgrade is not immediately possible, restrict MMCTL export command use to trusted users and apply strict file‑system permissions to the export directory
  • Monitor system logs for export activity by unauthorized users

Generated by OpenCVE AI on March 30, 2026 at 20:30 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-4765-v66x-rqx7 Mattermost doesn't set permissions on downloaded bulk export
References
History

Mon, 30 Mar 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Mattermost mattermost Server
CPEs cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*
cpe:2.3:a:mattermost:mattermost_server:11.4.0:*:*:*:*:*:*:*
Vendors & Products Mattermost mattermost Server

Fri, 27 Mar 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Mattermost
Mattermost mattermost
Vendors & Products Mattermost
Mattermost mattermost

Thu, 26 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Mar 2026 16:45:00 +0000

Type Values Removed Values Added
Description Mattermost versions 11.4.x <= 11.4.0, 11.3.x <= 11.3.1, 11.2.x <= 11.2.3, 10.11.x <= 10.11.11 fail to set permissions on downloaded bulk export which allows other local users on the server to be able to read contents of the bulk export.. Mattermost Advisory ID: MMSA-2026-00593
Title mmctl export download command doesn’t restrict permissions to created file to file owner
Weaknesses CWE-732
References
Metrics cvssV3_1

{'score': 5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N'}


Subscriptions

Mattermost Mattermost Mattermost Server
cve-icon MITRE

Status: PUBLISHED

Assigner: Mattermost

Published:

Updated: 2026-03-26T17:51:15.160Z

Reserved: 2026-02-24T10:59:55.681Z

Link: CVE-2026-3113

cve-icon Vulnrichment

Updated: 2026-03-26T17:47:41.119Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-26T17:16:42.307

Modified: 2026-03-30T19:41:30.957

Link: CVE-2026-3113

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-30T20:57:42Z

Weaknesses