VYPR
Medium severity6.5NVD Advisory· Published Apr 15, 2026· Updated Apr 22, 2026

CVE-2026-3590

CVE-2026-3590

Description

Mattermost versions 10.11.x <= 10.11.12, 11.5.x <= 11.5.0, 11.4.x <= 11.4.2, 11.3.x <= 11.3.2 fail to enforce atomic single-use consumption of guest magic link tokens, which allows an attacker with access to a valid magic link to establish multiple independent authenticated sessions via concurrent requests.. Mattermost Advisory ID: MMSA-2026-00624

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
github.com/mattermost/mattermost/server/v8Go
>= 8.0.0-20250721062209-4952acea88ce, < 8.0.0-20250723052842-4cb8d89403328.0.0-20250723052842-4cb8d8940332
github.com/mattermost/mattermost-serverGo
>= 10.11.0-rc1, < 10.11.1310.11.13
github.com/mattermost/mattermost-serverGo
>= 11.5.0-rc1, < 11.5.011.5.0
github.com/mattermost/mattermost-serverGo
>= 11.4.0-rc1, < 11.4.311.4.3
github.com/mattermost/mattermost-serverGo
>= 11.3.0-rc1, < 11.3.311.3.3

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.