VYPR
Low severity3.5NVD Advisory· Published May 18, 2026· Updated May 18, 2026

CVE-2026-4643

CVE-2026-4643

Description

Mattermost Desktop App versions <=6.1 6.0.1 5.4.13.0 fail to prevent server-rendered content from closing an underlying application view in the Mattermost Desktop App which allows a malicious server or plugin to crash the desktop client via invoking {{window.close()}} in the renderer context, leading to a denial of service condition at the client level. Mattermost Advisory ID: MMSA-2026-00633

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Mattermost Desktop App versions ≤6.1, 6.0.1, and 5.4.13.0 allow a malicious server or plugin to crash the client via window.close(), causing a denial of service.

Vulnerability

The Mattermost Desktop App fails to prevent server-rendered content from invoking window.close() in the renderer context. This affects versions ≤6.1, 6.0.1, and 5.4.13.0 [1]. A malicious server or plugin can trigger this JavaScript function to close the underlying application view, leading to a client-side denial of service condition.

Exploitation

An attacker must operate a malicious Mattermost server or have the ability to inject a plugin that renders content to the desktop client. No user interaction beyond connecting to the compromised server is required; the window.close() call is executed automatically when the crafted content is rendered in the application window [1].

Impact

Successful exploitation causes the Mattermost Desktop App to crash or close abruptly, denying the user access to the client until it is manually restarted. The attack does not lead to data disclosure, modification, or remote code execution; it is limited to a local denial of service at the client level [1].

Mitigation

Mattermost recommends upgrading to a fixed version as detailed on their security updates page [1]. As of the publication date (2026-05-18), users should check for patched releases (e.g., versions beyond 6.1, 6.0.1, and 5.4.13.0). No workarounds are disclosed in the available references.

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.