Impact
Mattermost API handlers for the plugin process do not validate user input. A crafted HTTP request to the PR details endpoint can crash the plugin, causing a denial of service for users who rely on the plugin’s functionality. This weakness falls under CWE-1287 and does not expose data but disrupts service continuity.
Affected Systems
The vulnerability affects Mattermost release lines 11.6.x (up to 11.6.0), 11.5.x (up to 11.5.3), 11.4.x (up to 11.4.4) and 10.11.x (up to 10.11.14). All these versions run the GitHub plugin API and are susceptible to a crash via authenticated request patterns.
Risk and Exploitability
The CVSS score of 4.3 reflects a moderate impact. EPSS data is unavailable and the vulnerability is not listed in CISA KEV. Exploitation requires an authenticated Mattermost user to send a specifically crafted request; therefore the attack vector is indirect and requires user engagement. While the attack could bring the plugin process down, it does not compromise data or elevate privileges.
OpenCVE Enrichment