Description
Mattermost Plugins versions <=11.5 11.1.5 10.13.11 11.3.4.0 fail to properly check for permissions when processing commands in the Gitlab plugin which allows normal users to uninstall instances or setup webhook connections via the {{gitlab instance {option}}} or the {{/gitlab webhook {option}}} commands. Mattermost Advisory ID: MMSA-2026-00600
Published: 2026-05-18
Score: 6.5 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Mattermost plugin versions up to 11.5, 11.1.5, 10.13.11, and 11.3.4.0 lack proper authorization checks when processing GitLab plugin commands. A normal registered user can invoke the {{gitlab instance {option}}} or {{/gitlab webhook {option}}} commands to uninstall plugin instances or configure webhook connections. This flaw enables a non‑admin user to execute privileged configuration operations, potentially compromising the integrity of the Mattermost environment and its integrations with external services. The weakness corresponds to CWE‑862, Missing Authorization.

Affected Systems

The affected product is the Mattermost GitLab plugin. All released plugin versions numbered 11.5 and below, 11.1.5, 10.13.11, and 11.3.4.0 are vulnerable. These plugins are used by Mattermost teams to integrate with GitLab services and manage webhooks.

Risk and Exploitability

The CVSS score of 6.5 indicates medium severity. The EPSS score is not available and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires a user with access to the Mattermost interface; the attacker must be authenticated but does not need administrative rights. Once a command is issued, the attacker can remove plugin instances or set up new webhooks, thereby degrading service availability and potentially exposing webhook traffic to unauthorized endpoints. Because the exploit involves user‑initiated commands, the attack vector is local through the Mattermost UI, but the impact is significant if used to disrupt external GitLab integrations.

Generated by OpenCVE AI on May 18, 2026 at 10:24 UTC.

Remediation

Vendor Solution

Update Mattermost Plugins to versions 11.6.0, 11.5.2, 10.11.14, 11.4.4 or higher.


OpenCVE Recommended Actions

  • Update the Mattermost GitLab plugin to a fixed version (11.6.0, 11.5.2, 10.11.14, 11.4.4 or later).
  • Reconfigure team role permissions so that only administrators can run {{gitlab instance}} or {{/gitlab webhook}} commands. (e.g., disable the commands for non‑admin roles.)
  • If the patch cannot be applied immediately, consider disabling or removing the GitLab plugin for all users until a secure version is installed.

Generated by OpenCVE AI on May 18, 2026 at 10:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

References
History

Mon, 18 May 2026 11:15:00 +0000

Type Values Removed Values Added
First Time appeared Mattermost
Mattermost mattermost
Vendors & Products Mattermost
Mattermost mattermost

Mon, 18 May 2026 09:00:00 +0000

Type Values Removed Values Added
Description Mattermost Plugins versions <=11.5 11.1.5 10.13.11 11.3.4.0 fail to properly check for permissions when processing commands in the Gitlab plugin which allows normal users to uninstall instances or setup webhook connections via the {{gitlab instance {option}}} or the {{/gitlab webhook {option}}} commands. Mattermost Advisory ID: MMSA-2026-00600
Title Instance and webhook GitLab plugin commands were able to be run by non-admin users
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

Mattermost Mattermost
cve-icon MITRE

Status: PUBLISHED

Assigner: Mattermost

Published:

Updated: 2026-05-18T08:09:57.222Z

Reserved: 2026-02-24T11:13:17.466Z

Link: CVE-2026-3117

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-18T09:16:22.707

Modified: 2026-05-18T09:16:22.707

Link: CVE-2026-3117

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-18T10:48:50Z

Weaknesses