Vulnerabilities (CVE)

Filtered by vendor Mattermost Subscribe
Total 320 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-0708 1 Mattermost 1 Mattermost 2024-02-28 4.0 MEDIUM 6.5 MEDIUM
Mattermost 6.3.0 and earlier fails to protect email addresses of the creator of the team via one of the APIs, which allows authenticated team members to access this information resulting in sensitive & private information disclosure.
CVE-2022-0903 1 Mattermost 1 Mattermost Server 2024-02-28 5.0 MEDIUM 7.5 HIGH
A call stack overflow bug in the SAML login feature in Mattermost server in versions up to and including 6.3.2 allows an attacker to crash the server via submitting a maliciously crafted POST body.
CVE-2022-1548 1 Mattermost 1 Playbooks 2024-02-28 6.5 MEDIUM 8.8 HIGH
Mattermost Playbooks plugin 1.25 and earlier fails to properly restrict user-level permissions, which allows playbook members to escalate their membership privileges and perform actions restricted to playbook admins.
CVE-2022-1002 1 Mattermost 1 Mattermost 2024-02-28 3.5 LOW 5.4 MEDIUM
Mattermost 6.3.0 and earlier fails to properly sanitize the HTML content in the email invitation sent to guest users, which allows registered users with special permissions to invite guest users to inject unescaped HTML content in the email invitations.
CVE-2022-1385 1 Mattermost 1 Mattermost Server 2024-02-28 5.8 MEDIUM 4.6 MEDIUM
Mattermost 6.4.x and earlier fails to properly invalidate pending email invitations when the action is performed from the system console, which allows accidentally invited users to join the workspace and access information from the public teams and channels.
CVE-2022-1337 1 Mattermost 1 Mattermost Server 2024-02-28 4.0 MEDIUM 6.5 MEDIUM
The image proxy component in Mattermost version 6.4.1 and earlier allocates memory for multiple copies of a proxied image, which allows an authenticated attacker to crash the server via links to very large image files.
CVE-2022-1384 1 Mattermost 1 Mattermost Server 2024-02-28 6.0 MEDIUM 8.8 HIGH
Mattermost version 6.4.x and earlier fails to properly check the plugin version when a plugin is installed from the Marketplace, which allows an authenticated and an authorized user to install and exploit an old plugin version from the Marketplace which might have known vulnerabilities.
CVE-2022-1333 1 Mattermost 1 Playbooks 2024-02-28 4.0 MEDIUM 6.5 MEDIUM
Mattermost Playbooks plugin v1.24.0 and earlier fails to properly check the limit on the number of webhooks, which allows authenticated and authorized users to create a specifically drafted Playbook which could trigger a large amount of webhook requests leading to Denial of Service.
CVE-2022-1003 1 Mattermost 1 Mattermost 2024-02-28 4.0 MEDIUM 4.9 MEDIUM
One of the API in Mattermost version 6.3.0 and earlier fails to properly protect the permissions, which allows the system administrators to combine the two distinct privileges/capabilities in a way that allows them to override certain restricted configurations like EnableUploads.
CVE-2022-1332 1 Mattermost 1 Mattermost Server 2024-02-28 4.0 MEDIUM 4.3 MEDIUM
One of the API in Mattermost version 6.4.1 and earlier fails to properly protect the permissions, which allows the authenticated members with restricted custom admin role to bypass the restrictions and view the server logs and server config.json file contents.
CVE-2022-1982 1 Mattermost 1 Mattermost Server 2024-02-28 4.0 MEDIUM 6.5 MEDIUM
Uncontrolled resource consumption in Mattermost version 6.6.0 and earlier allows an authenticated attacker to crash the server via a crafted SVG attachment on a post.
CVE-2022-0904 1 Mattermost 1 Mattermost Server 2024-02-28 4.0 MEDIUM 6.5 MEDIUM
A stack overflow bug in the document extractor in Mattermost Server in versions up to and including 6.3.2 allows an attacker to crash the server via submitting a maliciously crafted Apple Pages document.
CVE-2021-37863 1 Mattermost 1 Mattermost Server 2024-02-28 3.5 LOW 5.7 MEDIUM
Mattermost 6.0 and earlier fails to sufficiently validate parameters during post creation, which allows authenticated attackers to cause a client-side crash of the web application via a maliciously crafted post.
CVE-2021-37862 1 Mattermost 1 Mattermost Server 2024-02-28 5.8 MEDIUM 5.4 MEDIUM
Mattermost 6.0 and earlier fails to sufficiently validate the email address during registration, which allows attackers to trick users into signing up using attacker-controlled email addresses via crafted invitation token.
CVE-2021-37867 1 Mattermost 1 Mattermost Boards 2024-02-28 4.0 MEDIUM 4.3 MEDIUM
Mattermost Boards plugin v0.10.0 and earlier fails to protect email addresses of all users via one of the Boards APIs, which allows authenticated and unauthorized users to access this information resulting in sensitive & private information disclosure.
CVE-2021-37866 1 Mattermost 1 Mattermost Boards 2024-02-28 5.0 MEDIUM 7.5 HIGH
Mattermost Boards plugin v0.10.0 and earlier fails to invalidate a session on the server-side when a user logged out of Boards, which allows an attacker to reuse old session token for authorization.
CVE-2021-37864 1 Mattermost 1 Mattermost 2024-02-28 4.0 MEDIUM 6.5 MEDIUM
Mattermost 6.1 and earlier fails to sufficiently validate permissions while viewing archived channels, which allows authenticated users to view contents of archived channels even when this is denied by system administrators by directly accessing the APIs.
CVE-2021-37865 1 Mattermost 1 Mattermost 2024-02-28 3.5 LOW 5.7 MEDIUM
Mattermost 6.2 and earlier fails to sufficiently process a specifically crafted GIF file when it is uploaded while drafting a post, which allows authenticated users to cause resource exhaustion while processing the file, resulting in server-side Denial of Service.
CVE-2021-37860 1 Mattermost 1 Mattermost 2024-02-28 2.6 LOW 6.1 MEDIUM
Mattermost 5.38 and earlier fails to sufficiently sanitize clipboard contents, which allows a user-assisted attacker to inject arbitrary web script in product deployments that explicitly disable the default CSP.
CVE-2021-37861 1 Mattermost 1 Mattermost 2024-02-28 5.0 MEDIUM 7.5 HIGH
Mattermost 6.0.2 and earlier fails to sufficiently sanitize user's password in audit logs when user creation fails.