Description
Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2, 10.11.x <= 10.11.10 fail to validate team-specific upload_file permissions which allows a guest user to post files in channels where they lack upload_file permission via uploading files in a team where they have permission and reusing the file metadata in a POST request to a different team. Mattermost Advisory ID: MMSA-2025-00553
Published: 2026-03-16
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized file upload across teams
Action: Immediate Patch
AI Analysis

Impact

Mattermost servers version 11.3.x (up to 11.3.0), 11.2.x (up to 11.2.2) and 10.11.x (up to 10.11.10) fail to validate team‑specific upload_file permissions. This flaw allows a guest user who has upload_file permission in one team to post a file into a channel of a different team where the user has no such permission. The vulnerability is a classic Authorization bypass (CWE-863) that can enable the strategic delivery of files to restricted channels, potentially containing malicious content or sensitive data. The impact is the ability to extend a guest’s reach beyond intended boundaries, compromising confidentiality or integrity of channel data.

Affected Systems

Affected products: Mattermost Mattermost Server. Vulnerable versions are 11.3.x up to and including 11.3.0, 11.2.x up to and including 11.2.2, and 10.11.x up to and including 10.11.10.

Risk and Exploitability

The CVSS base score is 4.3, indicating moderate severity. The EPSS score is below 1%, suggesting low exploitation likelihood in the wild, and the vulnerability is not listed in the CISA KEV catalog. The attack requires a guest user that already has upload_file permission in at least one team; the user then uploads a file and reuses the metadata in a subsequent POST request targeting a different team, bypassing the permission check. The exploit does not require elevated privileges or network-level access and can be performed via the standard file‑upload API endpoints exposed by Mattermost.

Generated by OpenCVE AI on March 18, 2026 at 18:26 UTC.

Remediation

Vendor Solution

Update Mattermost to versions 11.4.0, 11.3.1, 11.2.3, 10.11.11 or higher.


OpenCVE Recommended Actions

  • Apply the Mattermost update to version 11.4.0, 11.3.1, 11.2.3, 10.11.11 or higher as recommended by the advisory.

Generated by OpenCVE AI on March 18, 2026 at 18:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-xpvf-6qcc-9jqc Mattermost fails to validate team-specific upload_file permissions
References
History

Mon, 30 Mar 2026 07:15:00 +0000

Type Values Removed Values Added
First Time appeared Mattermost mattermost
Mattermost server
Vendors & Products Mattermost mattermost
Mattermost server

Wed, 18 Mar 2026 17:45:00 +0000

Type Values Removed Values Added
First Time appeared Mattermost
Mattermost mattermost Server
CPEs cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*
Vendors & Products Mattermost
Mattermost mattermost Server

Mon, 16 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
Description Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2, 10.11.x <= 10.11.10 fail to validate team-specific upload_file permissions which allows a guest user to post files in channels where they lack upload_file permission via uploading files in a team where they have permission and reusing the file metadata in a POST request to a different team. Mattermost Advisory ID: MMSA-2025-00553
Title Guest user can upload files without permission across teams
Weaknesses CWE-863
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

Mattermost Mattermost Mattermost Server Server
cve-icon MITRE

Status: PUBLISHED

Assigner: Mattermost

Published:

Updated: 2026-03-16T13:49:55.080Z

Reserved: 2026-03-16T12:05:32.172Z

Link: CVE-2026-4265

cve-icon Vulnrichment

Updated: 2026-03-16T13:43:37.311Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-16T14:20:19.733

Modified: 2026-03-18T17:41:56.197

Link: CVE-2026-4265

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-30T07:02:27Z

Weaknesses