Description
Mattermost versions 11.5.x <= 11.5.1 fail to validate team-level run_create permission against the target team when creating a playbook run which allows an authenticated team member to create runs in teams where they lack permission via specifying a different team ID in the run creation API request. Mattermost Advisory ID: MMSA-2026-00629
Published: 2026-05-21
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Mattermost versions 11.5.x up to 11.5.1 allow a team member to create playbook runs in a different team by specifying an alternate team identifier in the run creation API. The backend logic fails to verify that the user has the required permission on the target team, enabling an authenticated attacker to fabricate runs they would otherwise be forbidden from creating. This flaw gives the attacker the ability to initiate potentially sensitive operational processes in teams they do not belong to, undermining confidentiality and integrity of team workflows.

Affected Systems

Mattermost, known to affect all deployments of version 11.5.x that are 11.5.1 or earlier. The vulnerability is specific to the playbook run creation endpoint and does not impact other modules.

Risk and Exploitability

The CVSS score is 4.3, indicating a moderate impact. EPSS data is not available and the vulnerability is not listed in CISA KEV. The exposure requires authenticated access, and the attacker only needs permissions to call the creation API. Because no high‑value data or system‑wide privileges are stolen, the likelihood of exploitation remains limited but should not be ignored.

Generated by OpenCVE AI on May 21, 2026 at 08:29 UTC.

Remediation

Vendor Solution

Update Mattermost to versions 11.6.0, 11.5.2, 10.11.14, 11.4.4 or higher.


OpenCVE Recommended Actions

  • Upgrade Mattermost to any supported release 11.6.0, 11.5.2, 10.11.14, 11.4.4, or later. This removes the incorrect authorization check for the run creation API.
  • If an immediate upgrade is not possible, modify or secure the API gateway so that requests to the playbook run creation endpoint are only forwarded to teams for which the caller possesses run_create permissions. This effectively restores the missing check.
  • Disable cross‑team playbook run creation for all users until the patch can be applied, or enforce a strict policy that rejects any run_create request whose target team ID differs from the caller’s current team.

Generated by OpenCVE AI on May 21, 2026 at 08:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

References
History

Thu, 21 May 2026 20:00:00 +0000

Type Values Removed Values Added
First Time appeared Mattermost mattermost Server
CPEs cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*
Vendors & Products Mattermost mattermost Server

Thu, 21 May 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 21 May 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Mattermost
Mattermost mattermost
Vendors & Products Mattermost
Mattermost mattermost

Thu, 21 May 2026 07:45:00 +0000

Type Values Removed Values Added
Description Mattermost versions 11.5.x <= 11.5.1 fail to validate team-level run_create permission against the target team when creating a playbook run which allows an authenticated team member to create runs in teams where they lack permission via specifying a different team ID in the run creation API request. Mattermost Advisory ID: MMSA-2026-00629
Title Insufficient permission validation on cross-team playbook run creation
Weaknesses CWE-863
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

Mattermost Mattermost Mattermost Server
cve-icon MITRE

Status: PUBLISHED

Assigner: Mattermost

Published:

Updated: 2026-05-21T12:39:35.248Z

Reserved: 2026-03-12T16:09:11.995Z

Link: CVE-2026-4055

cve-icon Vulnrichment

Updated: 2026-05-21T12:39:30.978Z

cve-icon NVD

Status : Analyzed

Published: 2026-05-21T08:16:23.130

Modified: 2026-05-21T19:45:43.413

Link: CVE-2026-4055

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-21T08:30:06Z

Weaknesses