CVE-2026-6346
Sensitive credentials exposed in plaintext in Mattermost support packets
CVSS Score
8.7
EPSS Score
0.0%
EPSS Percentile
0th
Mattermost versions 11.5.x <= 11.5.1, 10.11.x <= 10.11.13, 11.4.x <= 11.4.3 fail to sanitize sensitive configuration fields before including them in support packet generation, which allows a Mattermost System Admin or any party with access to a support packet to obtain sensitive credentials in plaintext via downloading a support packet from the System Console.. Mattermost Advisory ID: MMSA-2026-00607
| CWE | CWE-200 |
| Vendor | mattermost |
| Product | mattermost |
| Published | May 18, 2026 |
Stay Ahead of the Next One
Get instant alerts for mattermost mattermost
Be the first to know when new high vulnerabilities affecting mattermost mattermost are published β delivered to Slack, Telegram or Discord.
Get Free Alerts β
Free Β· No credit card Β· 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
None
Affected Versions
Mattermost / Mattermost
11.5.0 β€ 11.5.1 10.11.0 β€ 10.11.13 11.4.0 β€ 11.4.3
References
Credits
Edgar Bellot MicΓ³