Description
Mattermost versions 11.5.x <= 11.5.1, 10.11.x <= 10.11.13, 11.4.x <= 11.4.3 fail to sanitize sensitive configuration fields before including them in support packet generation, which allows a Mattermost System Admin or any party with access to a support packet to obtain sensitive credentials in plaintext via downloading a support packet from the System Console.. Mattermost Advisory ID: MMSA-2026-00607
Published: 2026-05-18
Score: 8.7 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Mattermost versions up to 11.5.1, 10.11.13, and 11.4.3 do not properly sanitize sensitive configuration fields when generating support packets. The resulting support packets contain plaintext credentials, enabling anyone with access to download a support packet to obtain these credentials. This constitutes a direct confidentiality breach that could allow attackers to compromise integrations or bypass authentication mechanisms.

Affected Systems

The vulnerable software is Mattermost Mattermost. Affected versions include 11.5.x versions up to and including 11.5.1, 10.11.x up to 10.11.13, and 11.4.x up to 11.4.3. Administrators or users with System Console access should verify their current patch level.

Risk and Exploitability

The CVSS score of 8.7 reflects a high severity. The EPSS score is not available, and the vulnerability is not in the CISA KEV catalog. Because the support packets are only accessible via the System Console, the likely attack vector involves an attacker who has gained access to the console or who has been granted permission to download support packets. Once a support packet is retrieved, the plaintext credentials can be extracted immediately, making exploitation quick and effective.

Generated by OpenCVE AI on May 18, 2026 at 10:23 UTC.

Remediation

Vendor Solution

Update Mattermost to versions 11.6.0, 11.5.2, 10.11.14, 11.4.4 or higher.


OpenCVE Recommended Actions

  • Update Mattermost to 11.6.0, 11.5.2, 10.11.14, 11.4.4 or later to resolve the sanitization issue.
  • Restrict access to the System Console and the support packet download feature to trusted administrators only, minimizing the chance an unauthorized party can obtain sensitive credentials.
  • Apply strong access controls for support packets, ensuring that any generated packets are deleted after use and consider disabling support packet generation if it is not required for operations.

Generated by OpenCVE AI on May 18, 2026 at 10:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

References
History

Mon, 18 May 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Mattermost
Mattermost mattermost
Vendors & Products Mattermost
Mattermost mattermost

Mon, 18 May 2026 09:00:00 +0000

Type Values Removed Values Added
Description Mattermost versions 11.5.x <= 11.5.1, 10.11.x <= 10.11.13, 11.4.x <= 11.4.3 fail to sanitize sensitive configuration fields before including them in support packet generation, which allows a Mattermost System Admin or any party with access to a support packet to obtain sensitive credentials in plaintext via downloading a support packet from the System Console.. Mattermost Advisory ID: MMSA-2026-00607
Title Sensitive credentials exposed in plaintext in Mattermost support packets
Weaknesses CWE-200
References
Metrics cvssV3_1

{'score': 8.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N'}


Subscriptions

Mattermost Mattermost
cve-icon MITRE

Status: PUBLISHED

Assigner: Mattermost

Published:

Updated: 2026-05-18T08:37:10.590Z

Reserved: 2026-04-15T10:50:45.853Z

Link: CVE-2026-6346

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-18T09:16:24.000

Modified: 2026-05-18T09:16:24.000

Link: CVE-2026-6346

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-18T10:30:23Z

Weaknesses