Description
Mattermost versions 11.6.x <= 11.6.0, 11.5.x <= 11.5.3, 11.4.x <= 11.4.4, 10.11.x <= 10.11.14 fail to properly validate msgpack-encoded WebSocket frames before memory allocation which allows an unauthenticated remote attacker to crash the server process and cause a full service outage for all users via a crafted binary WebSocket message sent to the public WebSocket endpoint.. Mattermost Advisory ID: MMSA-2026-00647
Published: 2026-05-22
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Mattermost versions 11.6.x and earlier, 11.5.x and earlier, 11.4.x and earlier, and 10.11.x and earlier fail to validate msgpack‑encoded WebSocket frames before allocating memory. An unauthenticated remote attacker can send a crafted binary WebSocket message to the public WebSocket endpoint, causing the server process to crash and resulting in a full service outage for all users. The vulnerability is a memory‑allocation flaw (CWE‑789).

Affected Systems

Affected products are Mattermost Server releases 10.11.x through 11.6.x, specifically versions up to 10.11.14, 11.4.4, 11.5.3, and 11.6.0. The impact applies to all users of these versions regardless of authentication status.

Risk and Exploitability

The CVSS score of 7.5 indicates a high‑severity denial‑of‑service impact. EPSS is not available, but the absence of a CISA KEV listing suggests no widespread exploitation reports yet. The attack vector is likely remote and unauthenticated, requiring only the ability to connect to the publicly exposed WebSocket endpoint. No additional resources or privileged access are needed to trigger the crash, making the vulnerability broadly exploitable to anyone who can reach the endpoint.

Generated by OpenCVE AI on May 22, 2026 at 12:21 UTC.

Remediation

Vendor Solution

Update Mattermost to versions 11.7.0, 11.6.1, 11.5.4, 11.4.5, 10.11.15 or higher.


OpenCVE Recommended Actions

  • Upgrade Mattermost to at least version 10.11.15, 11.4.5, 11.5.4, 11.6.1, or 11.7.0, whichever applies to your installation. This patch removes the input‑validation flaw.
  • While operating on the latest version, restrict access to the public WebSocket endpoint to trusted networks, or place a firewall rule that blocks unauthenticated connections until the upgrade is complete.
  • Implement application monitoring that alerts on unexpected server restarts or high CPU usage, and configure load balancer health checks to automatically redirect traffic away from a crashed instance.

Generated by OpenCVE AI on May 22, 2026 at 12:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

References
History

Fri, 22 May 2026 13:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 22 May 2026 13:15:00 +0000

Type Values Removed Values Added
First Time appeared Mattermost
Mattermost mattermost
Vendors & Products Mattermost
Mattermost mattermost

Fri, 22 May 2026 11:00:00 +0000

Type Values Removed Values Added
Description Mattermost versions 11.6.x <= 11.6.0, 11.5.x <= 11.5.3, 11.4.x <= 11.4.4, 10.11.x <= 10.11.14 fail to properly validate msgpack-encoded WebSocket frames before memory allocation which allows an unauthenticated remote attacker to crash the server process and cause a full service outage for all users via a crafted binary WebSocket message sent to the public WebSocket endpoint.. Mattermost Advisory ID: MMSA-2026-00647
Title Unauthenticated WebSocket binary frame causes denial of service in Mattermost Server
Weaknesses CWE-789
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

Mattermost Mattermost
cve-icon MITRE

Status: PUBLISHED

Assigner: Mattermost

Published:

Updated: 2026-05-22T12:14:25.145Z

Reserved: 2026-04-07T13:39:34.067Z

Link: CVE-2026-5740

cve-icon Vulnrichment

Updated: 2026-05-22T12:14:21.827Z

cve-icon NVD

No data.

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-22T13:00:12Z

Weaknesses