VYPR
Moderate severityNVD Advisory· Published Mar 26, 2026· Updated Mar 26, 2026

Arbitrary File Read via Advanced Logging Support Packet

CVE-2026-3112

Description

Mattermost versions 11.4.x <= 11.4.0, 11.3.x <= 11.3.1, 11.2.x <= 11.2.3, 10.11.x <= 10.11.11 fail to validate Advanced Logging file target paths which allows system administrators to read arbitrary host files via malicious AdvancedLoggingJSON configuration in support packet generation. Mattermost Advisory ID: MMSA-2025-00562

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
github.com/mattermost/mattermost/server/v8Go
>= 11.4.0-rc1, < 11.4.111.4.1
github.com/mattermost/mattermost/server/v8Go
>= 11.3.0-rc1, < 11.3.211.3.2
github.com/mattermost/mattermost/server/v8Go
>= 11.2.0-rc1, < 11.2.411.2.4
github.com/mattermost/mattermost/server/v8Go
>= 10.11.0-rc1, < 10.11.1210.11.12
github.com/mattermost/mattermost/server/v8Go
>= 8.0.0-20260105080200-d27a2195068d, < 8.0.0-20260217110922-b7d4a1f1f59b8.0.0-20260217110922-b7d4a1f1f59b

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

2