CVE-2026-4643
Description
Mattermost Desktop App versions <=6.1 6.0.1 5.4.13.0 fail to prevent server-rendered content from closing an underlying application view in the Mattermost Desktop App which allows a malicious server or plugin to crash the desktop client via invoking {{window.close()}} in the renderer context, leading to a denial of service condition at the client level. Mattermost Advisory ID: MMSA-2026-00633
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Mattermost Desktop App versions ≤6.1, 6.0.1, and 5.4.13.0 allow a malicious server or plugin to crash the client via window.close(), causing a denial of service.
Vulnerability
The Mattermost Desktop App fails to prevent server-rendered content from invoking window.close() in the renderer context. This affects versions ≤6.1, 6.0.1, and 5.4.13.0 [1]. A malicious server or plugin can trigger this JavaScript function to close the underlying application view, leading to a client-side denial of service condition.
Exploitation
An attacker must operate a malicious Mattermost server or have the ability to inject a plugin that renders content to the desktop client. No user interaction beyond connecting to the compromised server is required; the window.close() call is executed automatically when the crafted content is rendered in the application window [1].
Impact
Successful exploitation causes the Mattermost Desktop App to crash or close abruptly, denying the user access to the client until it is manually restarted. The attack does not lead to data disclosure, modification, or remote code execution; it is limited to a local denial of service at the client level [1].
Mitigation
Mattermost recommends upgrading to a fixed version as detailed on their security updates page [1]. As of the publication date (2026-05-18), users should check for patched releases (e.g., versions beyond 6.1, 6.0.1, and 5.4.13.0). No workarounds are disclosed in the available references.
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: <=6.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.