๐Ÿ” CVE Alert

Real-Time CVE Alerts & Vulnerability Tracker

Search enriched vulnerability intelligence โ€” EPSS exploitability scores, CVSS severity, CISA KEV status โ€” and get instant alerts to Slack, Telegram, Discord or Google Chat.

โšก Immediate or digest alerts ๐ŸŽฏ Filter by ecosystem, severity, EPSS ๐Ÿ”‘ CISA KEV tracking ๐Ÿ†“ Free forever

236,247 results

CVE-2026-7498HIGH 8.8

Stored XSS in Basamak Informatics' DernekWeb

Improper neutralization of input during web page generation ('cross-site scripting') vulnerability in Basamak Information Technology Consulting and Organization Trade Ltd. Co. DernekWeb allows Stored XSS. This issue affects DernekWeb: through 30122025.

EPSS
0.0%
basamak information technology consulting and organization trade ltd. co. / dernekwebMay 18, 2026
CVE-2026-3471MEDIUM 6.5

Opening a window with {{javascript:alert()}} as URL causes crash in the Mattermost Desktop App

Mattermost Desktop App versions <=6.1 6.0.1 5.4.13.0 fail to prevent an invalid URL from loading in a pop-up window in the Mattermost Desktop App which allows a malicious server owner to repeated crash the application via calling {{window.open('javascript:alert()');}}. Mattermost Advisory ID: MMSA-2026-00618

EPSS
0.0%
mattermost / mattermostMay 18, 2026
CVE-2026-4643LOW 3.5

Calling window.close() from server-side content causes crash in the Mattermost Desktop App

Mattermost Desktop App versions <=6.1 6.0.1 5.4.13.0 fail to prevent server-rendered content from closing an underlying application view in the Mattermost Desktop App which allows a malicious server or plugin to crash the desktop client via invoking {{window.close()}} in the renderer context, leading to a denial of service condition at the client level. Mattermost Advisory ID: MMSA-2026-00633

EPSS
0.0%
mattermost / mattermostMay 18, 2026
CVE-2026-6333LOW 3.5

SSRF via Host Header Spoofing in Custom Slash Commands

Mattermost versions 11.5.x <= 11.5.1, 10.11.x <= 10.11.13 fail to validate the Host header when constructing response URLs for custom slash commands which allows an authenticated attacker to redirect slash command responses to an attacker-controlled server via a spoofed Host header.. Mattermost Advisory ID: MMSA-2026-00582

EPSS
0.0%
mattermost / mattermostMay 18, 2026
CVE-2026-6345MEDIUM 6.5

Prevent password disclosure and force reset during Slack import

Mattermost versions 11.5.x <= 11.5.1, 10.11.x <= 10.11.13, 11.4.x <= 11.4.3 fail prevent disclosure of created user password which allows a malicious attacker to impersonate a user via the use of some of those passwords.. Mattermost Advisory ID: MMSA-2026-00614

EPSS
0.0%
mattermost / mattermostMay 18, 2026
CVE-2026-6346HIGH 8.7

Sensitive credentials exposed in plaintext in Mattermost support packets

Mattermost versions 11.5.x <= 11.5.1, 10.11.x <= 10.11.13, 11.4.x <= 11.4.3 fail to sanitize sensitive configuration fields before including them in support packet generation, which allows a Mattermost System Admin or any party with access to a support packet to obtain sensitive credentials in plaintext via downloading a support packet from the System Console.. Mattermost Advisory ID: MMSA-2026-00607

EPSS
0.0%
mattermost / mattermostMay 18, 2026
CVE-2026-28732MEDIUM 4.3

Slash command trigger-word update allowed command hijacking

Mattermost versions 11.5.x <= 11.5.1, 10.11.x <= 10.11.13, 11.4.x <= 11.4.3 Fail to enforce slash command trigger-word uniqueness during command updates which allows an authenticated team member with Manage Own Slash Commands permission to hijack and impersonate existing system or custom slash commands via editing their own slash command trigger to an already-registered trigger through the command update API. Mattermost Advisory ID: MMSA-2026-00597

EPSS
0.0%
mattermost / mattermostMay 18, 2026
CVE-2026-6343MEDIUM 4.3

Mattermost Playbooks Plugin fails to enforce view permissions in list endpoints, allowing unauthorized access to public playbooks

Mattermost versions 11.5.x <= 11.5.1, 10.11.x <= 10.11.13, 11.4.x <= 11.4.3 fail to check public/private permissions which allows members without these permissions to access public playbooks via /get.. Mattermost Advisory ID: MMSA-2026-00591

EPSS
0.0%
mattermost / mattermostMay 18, 2026
CVE-2026-6347HIGH 7.6

Mattermost Calls plugin exposes TURN server credentials in plaintext in support packets

Mattermost versions 11.5.x <= 11.5.1, 10.11.x <= 10.11.13, 11.4.x <= 11.4.3 fail to sanitize sensitive configuration fields in the Mattermost Calls plugin which allows an attacker with access to a support packet to obtain TURN server credentials via the plaintext values present in the exported plugin configuration.. Mattermost Advisory ID: MMSA-2026-00605

EPSS
0.0%
mattermost / mattermostMay 18, 2026
CVE-2026-5163MEDIUM 6.5

Missing authorization check in AI message rewrite endpoint allows access to private thread content

Mattermost versions 11.5.x <= 11.5.1 fail to verify channel membership when processing AI-assisted message rewrites which allows an authenticated attacker to read the content of threads in private channels and direct messages they do not have access to via a crafted request to the post rewrite endpoint.. Mattermost Advisory ID: MMSA-2026-00645

EPSS
0.0%
mattermost / mattermostMay 18, 2026
CVE-2026-3117MEDIUM 6.5

Instance and webhook GitLab plugin commands were able to be run by non-admin users

Mattermost Plugins versions <=11.5 11.1.5 10.13.11 11.3.4.0 fail to properly check for permissions when processing commands in the Gitlab plugin which allows normal users to uninstall instances or setup webhook connections via the {{gitlab instance {option}}} or the {{/gitlab webhook {option}}} commands. Mattermost Advisory ID: MMSA-2026-00600

EPSS
0.0%
mattermost / mattermostMay 18, 2026
CVE-2026-4286LOW 3.1

Playbooks Plugin fails to validate team transfers, allowing unauthorized removal of member access via playbook update

Mattermost versions 11.5.x <= 11.5.1, 10.11.x <= 10.11.13 fail to check if {{team_id}} was being changed when updating playbooks, allowing users with only {{Manage Playbook Configurations}} permission to change a playbook's team, bypassing manage members restriction via PUT api. Mattermost Advisory ID: MMSA-2025-00552

EPSS
0.0%
mattermost / mattermostMay 18, 2026
CVE-2026-6339MEDIUM 4.3

Missing request origin validation on burn-on-read reveal endpoint

Mattermost versions 11.5.x <= 11.5.1, 11.4.x <= 11.4.3 fail to validate the X-Requested-With header on the burn-on-read reveal endpoint which allows an authenticated channel member to force the reveal of a burn-on-read message without recipient consent via a crafted Markdown image tag.. Mattermost Advisory ID: MMSA-2026-00636

EPSS
0.0%
mattermost / mattermostMay 18, 2026
CVE-2026-6902UNKNOWN 0.0

Code Injection in Perforce P4 (Helix Core)

A vulnerability in Command-Line Client in P4 Server prior to the 2025.2 Patch 2, identified as CVE-2026-6902, has been fixed in P4 Server to address potential security risks.

EPSS
0.0%
perforce / p4 (helix core)May 18, 2026
CVE-2026-6340MEDIUM 4.3

Memory Exhaustion via Malicious 7zip File Upload

Mattermost versions 11.5.x <= 11.5.1, 10.11.x <= 10.11.13, 11.4.x <= 11.4.3 fail to validate 7zip archive structure before processing which allows an authenticated attacker to cause server memory exhaustion and denial of service via uploading a specially crafted 7zip file with excessive folder declarations.. Mattermost Advisory ID: MMSA-2026-00573

EPSS
0.0%
mattermost / mattermostMay 18, 2026
CVE-2026-6341MEDIUM 4.3

Incomplete group locking implementation

Mattermost Plugins versions <=11.5 11.1.5 10.13.11 11.3.4.0 fail to have API-level checks on which groups the user can create issues or attach comments to which allows a user that is member of multiple groups to create issues to a locked group via direct API requests. Mattermost Advisory ID: MMSA-2026-00602

EPSS
0.0%
mattermost / mattermostMay 18, 2026
CVE-2026-6342MEDIUM 4.3

Group prefix matching bypass for subscriptions

Mattermost Plugins versions <=11.5 11.1.5 10.13.11 11.3.4.0 fail to appropriately check for valid namespaces which allows plugin users to create subscriptions to groups that were not whitelisted via creating groups that share the same prefix as a whitelisted group. Mattermost Advisory ID: MMSA-2026-00601

EPSS
0.0%
mattermost / mattermostMay 18, 2026
CVE-2026-3495LOW 3.8

Unescaped variables during error page composition

Mattermost versions 11.5.x <= 11.5.1, 10.11.x <= 10.11.13 fail to escape some variables that could contain malicious content during error page composition which allows an attacker with access to edit some site configuration to execute some malicious code via injecting some JS as part of those values.. Mattermost Advisory ID: MMSA-2026-00622

EPSS
0.0%
mattermost / mattermostMay 18, 2026
CVE-2026-4273LOW 3.7

Insufficient token rotation validation in remote cluster invite confirmation

Mattermost versions 11.5.x <= 11.5.1, 10.11.x <= 10.11.13 fail to validate that the RefreshedToken differs from the original invite token during remote cluster invite confirmation which allows an authenticated attacker to bypass token rotation and reuse the original invite token via sending a crafted invite confirmation with a RefreshedToken matching the original token. Mattermost Advisory ID: MMSA-2026-00575

EPSS
0.0%
mattermost / mattermostMay 18, 2026
CVE-2026-3637MEDIUM 4.3

Mattermost fails to enforce create_post permission when editing posts

Mattermost versions 11.5.x <= 11.5.1, 10.11.x <= 10.11.13, 11.4.x <= 11.4.3 fail to check the create_post channel permission during post edit operations which allows an authenticated attacker with revoked posting privileges to modify their existing posts via direct API requests to the post update and patch endpoints.. Mattermost Advisory ID: MMSA-2026-00627

EPSS
0.0%
mattermost / mattermostMay 18, 2026

Never miss a critical vulnerability

Set up free alerts in 60 seconds. Filter by ecosystem, CVSS score or EPSS โ€” get notified to Slack, Telegram, Discord or Google Chat the moment a new CVE matches.

Set Up Free Alerts โ†’ Create Free Account

Slack ยท Telegram ยท Discord ยท Google Chat