VYPR
Medium severity6.5NVD Advisory· Published May 18, 2026· Updated May 18, 2026

CVE-2026-5163

CVE-2026-5163

Description

Mattermost versions 11.5.x <= 11.5.1 fail to verify channel membership when processing AI-assisted message rewrites which allows an authenticated attacker to read the content of threads in private channels and direct messages they do not have access to via a crafted request to the post rewrite endpoint.. Mattermost Advisory ID: MMSA-2026-00645

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Mattermost fails to verify channel membership during AI-assisted message rewrites, allowing authenticated attackers to read private thread content.

Vulnerability

Overview

CVE-2026-5163 is a medium-severity vulnerability in Mattermost versions 11.5.x up to and including 11.5.1. The application fails to verify channel membership when processing AI-assisted message rewrites of AI-assisted messages. This missing authorization check allows an authenticated attacker to read the content of threads in private channels and direct messages they do not have access to by sending a crafted request to the post rewrite endpoint [1].

Exploitation

An attacker must be authenticated to the Mattermost instance. No special privileges are required beyond a valid user account. The attack is carried out by crafting a request to the post rewrite endpoint that references a thread in a private channel or direct message conversation the attacker is not a member of. Because the endpoint does not validate that the requesting user belongs to the target channel, the attacker can retrieve the thread content [1].

Impact

Successful exploitation allows the attacker to read the contents of private threads and direct messages, leading to unauthorized disclosure of sensitive information. This could include confidential business communications, personal messages, or other data that should be restricted to channel members [1].

Mitigation

Mattermost has addressed this issue in a security update. Users should upgrade to a patched version of Mattermost (11.5.2 or later) as recommended in the Mattermost security advisory MMSA-2026-00645 [1]. No workarounds have been publicly documented.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2
  • Mattermost/Mattermostinferred2 versions
    >=11.5,<=11.5.1+ 1 more
    • (no CPE)range: >=11.5,<=11.5.1
    • (no CPE)range: <=11.5.1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.