<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-3108 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-3108/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 26 Mar 2026 17:16:41 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-3108/feed.xml" rel="self" type="application/rss+xml"/><item><title>Mattermost mmctl Terminal Injection Vulnerability (CVE-2026-3108)</title><link>https://feed.craftedsignal.io/briefs/2026-03-mattermost-terminal-injection/</link><pubDate>Thu, 26 Mar 2026 17:16:41 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-mattermost-terminal-injection/</guid><description>Mattermost versions 11.2.x &lt;= 11.2.2, 10.11.x &lt;= 10.11.10, 11.4.x &lt;= 11.4.0, 11.3.x &lt;= 11.3.1 are vulnerable to terminal injection, allowing attackers to manipulate administrator terminals via crafted messages containing ANSI and OSC escape sequences.</description><content:encoded><![CDATA[<p>CVE-2026-3108 affects Mattermost servers using the <code>mmctl</code> command-line tool. This vulnerability, disclosed in March 2026, stems from a failure to properly sanitize user-controlled post content within the terminal output of <code>mmctl</code> commands. Specifically, versions 11.2.x up to 11.2.2, 10.11.x up to 10.11.10, 11.4.x up to 11.4.0, and 11.3.x up to 11.3.1 are susceptible. An attacker leveraging this flaw can inject ANSI and OSC escape sequences into administrator terminals. These sequences enable…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-3108</category><category>mattermost</category><category>terminal-injection</category></item></channel></rss>