πŸ” CVE Alert

CVE-2026-6346

HIGH 8.7

Sensitive credentials exposed in plaintext in Mattermost support packets

CVSS Score
8.7
EPSS Score
0.0%
EPSS Percentile
0th

Mattermost versions 11.5.x <= 11.5.1, 10.11.x <= 10.11.13, 11.4.x <= 11.4.3 fail to sanitize sensitive configuration fields before including them in support packet generation, which allows a Mattermost System Admin or any party with access to a support packet to obtain sensitive credentials in plaintext via downloading a support packet from the System Console.. Mattermost Advisory ID: MMSA-2026-00607

CWE CWE-200
Vendor mattermost
Product mattermost
Published May 18, 2026
Stay Ahead of the Next One

Get instant alerts for mattermost mattermost

Be the first to know when new high vulnerabilities affecting mattermost mattermost are published β€” delivered to Slack, Telegram or Discord.

Get Free Alerts β†’ Free Β· No credit card Β· 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
None

Affected Versions

Mattermost / Mattermost
11.5.0 ≀ 11.5.1 10.11.0 ≀ 10.11.13 11.4.0 ≀ 11.4.3

References

NVD β†— CVE.org β†— EPSS Data β†—
mattermost.com: https://mattermost.com/security-updates

Credits

Edgar Bellot MicΓ³