VYPR
Medium severity4.3NVD Advisory· Published May 18, 2026· Updated May 18, 2026

CVE-2026-6341

CVE-2026-6341

Description

Mattermost Plugins versions <=11.5 11.1.5 10.13.11 11.3.4.0 fail to have API-level checks on which groups the user can create issues or attach comments to which allows a user that is member of multiple groups to create issues to a locked group via direct API requests. Mattermost Advisory ID: MMSA-2026-00602

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Mattermost Plugins fail to enforce API-level group membership checks, allowing a user in multiple groups to create issues or attach comments on locked groups via direct API requests.

Vulnerability

Mattermost Plugins versions <=11.5, 11.1.5, 10.13.11, and 11.3.4.0 lack API-level checks on which groups a user can create issues or attach comments to [1]. This allows a user who is a member of multiple groups to bypass the intended group-level access controls by sending direct API requests to a locked group [1].

Exploitation

An attacker must be an authenticated user and a member of at least two groups, one of which is a locked group (where issue creation or comment attachment is restricted) [1]. The attacker can then craft direct API requests to create issues or attach comments to the locked group, bypassing the UI-level restrictions that would normally prevent such actions [1]. No additional privileges or user interaction beyond authentication are required.

Impact

Successful exploitation allows the attacker to create issues or attach comments to a locked group, effectively circumventing the group's intended access restrictions [1]. This could lead to unauthorized information disclosure or disruption within the group, as the attacker can post content that should have been blocked.

Mitigation

Mattermost has released security updates to address this vulnerability. Affected users should upgrade to a fixed version as listed in the Mattermost security advisory [1]. No workaround is available; upgrading is the recommended mitigation.

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.