Description
Mattermost versions 11.5.x <= 11.5.1, 10.11.x <= 10.11.13, 11.4.x <= 11.4.3 Fail to validate the response body of proxied images, which allows a remote attacker to enact client-side DoS via an SVG file served from an attacker-controlled origin under a non-SVG Content-Type header (e.g. image/png) embedded in an og:image meta tag or Markdown image link.. Mattermost Advisory ID: MMSA-2026-00630
Published: 2026-05-15
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Mattermost versions before 11.6.0 (specifically 11.5.x up to 11.5.1, 10.11.x up to 10.11.13, and 11.4.x up to 11.4.3) do not validate the content of images that are retrieved through the image proxy. An attacker who controls an image origin can serve an SVG file that is labeled with a non‑SVG Content‑Type header, such as image/png, and embed it in an og:image meta tag or a Markdown image link within a message. The image proxy forwards the file unchanged to the client, so the victim’s browser parses the SVG and triggers a client‑side denial of service. This flaw is a form of insecure content‑type handling (CWE‑754) and results in a client‑side denial of service that fails over the document rendering process. The overall severity is reflected in a CVSS score of 4.3.

Affected Systems

Any Mattermost instance running version 11.5.1 or earlier of the 11.5 series, 10.11.13 or earlier of the 10.11 series, or 11.4.3 or earlier of the 11.4 series is impacted. The official remedy is to upgrade to 11.6.0, 11.5.2, 10.11.14, or 11.4.4 respectively, or any later release.

Risk and Exploitability

The CVSS score of 4.3 indicates moderate severity. No EPSS data is available, and the vulnerability is not listed in the CISA KEV catalog, suggesting limited known exploitation. The attack requires an attacker to control an image‑serving domain and embed the malicious SVG in a message that a user will view; based on the description, it is inferred that the attacker does not require privileged access to the Mattermost server. Therefore the exploitation probability is low, but the impact is that any user who renders the compromised content will experience a client‑side denial of service. Organizational risk is limited to environments where end users routinely view untrusted images in Mattermost posts.

Generated by OpenCVE AI on May 15, 2026 at 20:51 UTC.

Remediation

Vendor Solution

Update Mattermost to versions 11.6.0, 11.5.2, 10.11.14, 11.4.4 or higher.


OpenCVE Recommended Actions

  • Update Mattermost to a non‑vulnerable version: 11.6.0, 11.5.2, 10.11.14, 11.4.4 or newer.
  • If an upgrade cannot be performed immediately, configure Mattermost to restrict the image proxy to known, trusted origins or disable the proxy for non‑trusted sources.
  • Review and adjust the image proxy configuration to enforce strict validation of both content‑type headers and the body content, ensuring that only valid image formats are served to clients.

Generated by OpenCVE AI on May 15, 2026 at 20:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

References
History

Fri, 15 May 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 15 May 2026 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Mattermost
Mattermost mattermost
Vendors & Products Mattermost
Mattermost mattermost

Fri, 15 May 2026 19:00:00 +0000

Type Values Removed Values Added
Description Mattermost versions 11.5.x <= 11.5.1, 10.11.x <= 10.11.13, 11.4.x <= 11.4.3 Fail to validate the response body of proxied images, which allows a remote attacker to enact client-side DoS via an SVG file served from an attacker-controlled origin under a non-SVG Content-Type header (e.g. image/png) embedded in an og:image meta tag or Markdown image link.. Mattermost Advisory ID: MMSA-2026-00630
Title SVG content served through Mattermost image proxy despite Content-Type restrictions causes client-side denial of service
Weaknesses CWE-754
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L'}


Subscriptions

Mattermost Mattermost
cve-icon MITRE

Status: PUBLISHED

Assigner: Mattermost

Published:

Updated: 2026-05-15T20:23:24.121Z

Reserved: 2026-03-12T16:08:33.686Z

Link: CVE-2026-4054

cve-icon Vulnrichment

Updated: 2026-05-15T20:23:20.560Z

cve-icon NVD

Status : Received

Published: 2026-05-15T19:17:04.803

Modified: 2026-05-15T19:17:04.803

Link: CVE-2026-4054

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-15T21:00:09Z

Weaknesses