Description
Mattermost versions 11.5.x <= 11.5.1 fail to verify channel membership when processing AI-assisted message rewrites which allows an authenticated attacker to read the content of threads in private channels and direct messages they do not have access to via a crafted request to the post rewrite endpoint.. Mattermost Advisory ID: MMSA-2026-00645
Published: 2026-05-18
Score: 6.5 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability involves a missing authorization check in the AI-assisted message rewrite endpoint of Mattermost Release 11.5.x, allowing an authenticated attacker to read private thread content in channels or direct messages they are not members of. The flaw permits leakage of confidential user conversations, compromising confidentiality for all private threads accessible through the rewrite feature. The weakness corresponds to CWE‑862, indicating an improper authorization control.

Affected Systems

The affected product is Mattermost Version 11.5.x through 11.5.1. All Mattermost installations using these versions lack the necessary channel membership verification during AI rewrite requests. Future releases, including Mattermost 11.5.2 and any 11.6.0 version or later, contain the fix.

Risk and Exploitability

The CVSS score of 6.5 indicates a moderate severity vulnerability. EPSS information is not available, so the precise exploitation likelihood cannot be quantified, but the flaw is exploitable by any authenticated user who can send a crafted rewrite request. The vulnerability is not listed in CISA KEV, implying no confirmed exploits yet, yet the ability to expose private conversation content poses a significant confidentiality risk.

Generated by OpenCVE AI on May 18, 2026 at 10:50 UTC.

Remediation

Vendor Solution

Update Mattermost to versions 11.6.0, 11.5.2 or higher.


OpenCVE Recommended Actions

  • Update Mattermost to at least 11.6.0 or 11.5.2 to apply the authorization check fix.
  • If an upgrade is not possible immediately, disable the AI‑assisted message rewrite endpoint or feature to remove the attack vector.
  • Monitor audit logs and channel permissions for anomalous activity or attempts to access private thread content via rewrite requests.

Generated by OpenCVE AI on May 18, 2026 at 10:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

References
History

Mon, 18 May 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Mattermost
Mattermost mattermost
Vendors & Products Mattermost
Mattermost mattermost

Mon, 18 May 2026 09:00:00 +0000

Type Values Removed Values Added
Description Mattermost versions 11.5.x <= 11.5.1 fail to verify channel membership when processing AI-assisted message rewrites which allows an authenticated attacker to read the content of threads in private channels and direct messages they do not have access to via a crafted request to the post rewrite endpoint.. Mattermost Advisory ID: MMSA-2026-00645
Title Missing authorization check in AI message rewrite endpoint allows access to private thread content
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Mattermost Mattermost
cve-icon MITRE

Status: PUBLISHED

Assigner: Mattermost

Published:

Updated: 2026-05-18T08:11:13.972Z

Reserved: 2026-03-30T14:35:03.836Z

Link: CVE-2026-5163

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-18T09:16:23.273

Modified: 2026-05-18T09:16:23.273

Link: CVE-2026-5163

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-18T11:00:11Z

Weaknesses