-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/mattermost/mattermost/server/v8 | go | >= 10.0.0, < 10.0.3 | 10.0.3 |
| github.com/mattermost/mattermost/server/v8 | go | >= 9.11.0, < 9.11.5 | 9.11.5 |
| github.com/mattermost/mattermost/server/v8 | go | >= 9.5.0, < 9.5.13 | 9.5.13 |
| github.com/mattermost/mattermost/server/v8 | go | >= 10.1.0, < 10.1.3 | 10.1.3 |
The vulnerability stems from improper synchronization during failed login attempt tracking. Functions handling authentication and attempt counting are prime candidates. In Go, race conditions often occur when shared resources (like attempt counters) are accessed without mutexes or atomic operations. The listed functions are core to the login flow and would logically contain the check-then-update pattern described in the advisory. While exact code isn't available, these are standard components in Mattermost's authentication system where such a race condition would manifest.
KEV Misses 88% of Exploited CVEs- Get the report