Description
Mattermost versions 11.6.x <= 11.6.0, 11.5.x <= 11.5.2, 11.5.x <= 11.5.3, 11.4.x <= 11.4.4, 10.11.x <= 10.11.14 fail to validate the TIFF IFD offset in the image header before allocating memory, which allows authenticated users with file upload or posting permissions to cause a denial of service (server OOM) via uploading a crafted TIFF file or posting a URL that serves one.. Mattermost Advisory ID: MMSA-2026-00648
Published: 2026-05-22
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Mattermost processes TIFF files without validating the IFD offset, enabling an authenticated attacker to trigger a server out‑of‑memory condition using a malformed file or an external URL. The flaw can be exercised by any user with file upload or message posting permissions and results in a denial of service by exhausting memory until the service becomes unresponsive. This is a classic example of unchecked resource allocation (CWE‑400).

Affected Systems

The issue affects Mattermost releases 11.6.x up through 11.6.0, 11.5.x up through 11.5.2 and 11.5.3, 11.4.x up through 11.4.4, and 10.11.x up through 10.11.14. All these are mitigated by upgrading to at least Mattermost version 11.7.0, 11.6.1, 11.5.4, 11.4.5, or 10.11.15 or newer for each respective major version.

Risk and Exploitability

With a CVSS score of 6.5, this vulnerability is considered medium severity. No EPSS data is available and the issue is not listed in CISA’s KEV catalogue, suggesting that widespread exploitation has not been observed. An attacker must be authenticated and possess either file upload or posting rights, implying the exploitation vector is likely internal or from a compromised account. Once the crafted TIFF is processed, the server allocates large amounts of memory and eventually exhausts available RAM, leading to a denial of service. The lack of public exploits and low EPSS leave the risk moderate but still actionable.

Generated by OpenCVE AI on May 22, 2026 at 12:22 UTC.

Remediation

Vendor Solution

Update Mattermost to versions 11.7.0, 11.6.1, 11.5.3, 11.5.4, 11.4.5, 10.11.15 or higher.


OpenCVE Recommended Actions

  • Update your Mattermost installation to version 11.7.0 or newer, or to 11.6.1, 11.5.4, 11.4.5, or 10.11.15 or later as appropriate for your deployment.
  • Restrict file upload and message posting permissions to trusted users only and review user role assignments to remove unnecessary upload rights.
  • Monitor server resource usage and logs for signs of out‑of‑memory conditions and consider temporarily disabling file uploads if the service becomes unstable.

Generated by OpenCVE AI on May 22, 2026 at 12:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

References
History

Fri, 22 May 2026 13:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 22 May 2026 12:45:00 +0000

Type Values Removed Values Added
First Time appeared Mattermost
Mattermost mattermost
Vendors & Products Mattermost
Mattermost mattermost

Fri, 22 May 2026 11:00:00 +0000

Type Values Removed Values Added
Description Mattermost versions 11.6.x <= 11.6.0, 11.5.x <= 11.5.2, 11.5.x <= 11.5.3, 11.4.x <= 11.4.4, 10.11.x <= 10.11.14 fail to validate the TIFF IFD offset in the image header before allocating memory, which allows authenticated users with file upload or posting permissions to cause a denial of service (server OOM) via uploading a crafted TIFF file or posting a URL that serves one.. Mattermost Advisory ID: MMSA-2026-00648
Title Denial of service via crafted TIFF file upload
Weaknesses CWE-400
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

Mattermost Mattermost
cve-icon MITRE

Status: PUBLISHED

Assigner: Mattermost

Published:

Updated: 2026-05-22T12:15:24.414Z

Reserved: 2026-04-07T16:22:49.762Z

Link: CVE-2026-5755

cve-icon Vulnrichment

Updated: 2026-05-22T12:15:21.063Z

cve-icon NVD

No data.

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-22T12:30:27Z

Weaknesses