-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from insufficient validation of synthetic/remote user status in authentication flows. Key functions were identified through: 1) The CWE-693 classification indicating protection mechanism failures 2) The described attack vector involving shared channel email munging 3) Core user management operations (session creation, password resets) being the impacted areas 4) Mattermost's architecture where these functions typically handle authentication logic. Confidence is medium due to lack of direct commit evidence, but grounded in the vulnerability pattern and Mattermost's known code structure.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/mattermost/mattermost/server/v8 | go | >= 9.9.0, < 9.9.2 | 9.9.2 |
| github.com/mattermost/mattermost/server/v8 | go | >= 9.5.0, < 9.5.8 | 9.5.8 |
| github.com/mattermost/mattermost/server/v8 | go | >= 9.10.0, < 9.10.1 | 9.10.1 |
| github.com/mattermost/mattermost/server/v8 | go | >= 9.8.0, < 9.8.3 | 9.8.3 |
KEV Misses 88% of Exploited CVEs- Get the report