<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Legal-Hold — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/legal-hold/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 06 Apr 2026 13:17:18 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/legal-hold/feed.xml" rel="self" type="application/rss+xml"/><item><title>Mattermost Legal Hold Plugin Authentication Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-mattermost-legal-hold-auth-bypass/</link><pubDate>Mon, 06 Apr 2026 13:17:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-mattermost-legal-hold-auth-bypass/</guid><description>Mattermost Legal Hold plugin versions 1.1.4 and earlier allow authenticated attackers to bypass authorization checks, enabling unauthorized access and modification of legal hold data via crafted API requests.</description><content:encoded><![CDATA[<p>The Mattermost Legal Hold plugin, in versions 1.1.4 and earlier, contains an authentication bypass vulnerability (CVE-2026-3524) that can be exploited by authenticated attackers. The vulnerability lies in the ServeHTTP function, where a failed authorization check does not properly halt request processing. This flaw allows attackers to craft malicious API requests to the plugin&rsquo;s endpoints, enabling them to access, create, download, and delete legal hold data without proper authorization. The vulnerability is identified by Mattermost Advisory ID MMSA-2026-00621 and poses a significant risk to organizations using the affected plugin versions, potentially leading to data breaches and compliance violations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the Mattermost server with valid user credentials.</li>
<li>Attacker crafts a malicious API request targeting the Legal Hold plugin&rsquo;s endpoints.</li>
<li>The request is sent to the Mattermost server.</li>
<li>The ServeHTTP function in the Legal Hold plugin processes the request.</li>
<li>Authorization check fails due to insufficient privileges or incorrect parameters.</li>
<li>Instead of halting request processing, the plugin continues to execute the request.</li>
<li>The attacker gains unauthorized access to legal hold data or performs unauthorized actions (create, download, delete).</li>
<li>The attacker successfully exfiltrates or manipulates sensitive legal hold information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability (CVE-2026-3524) allows authenticated attackers to bypass authorization controls within the Mattermost Legal Hold plugin. This can result in unauthorized access, creation, modification, or deletion of sensitive legal hold data. The vulnerability affects versions 1.1.4 and earlier of the plugin. Organizations using the affected versions are at risk of data breaches, compliance violations, and reputational damage. A CVSS v3.1 score of 8.8 indicates a high level of severity due to the potential for significant data compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Mattermost Legal Hold plugin to a version later than 1.1.4 to remediate CVE-2026-3524.</li>
<li>Deploy the Sigma rules provided in this brief to detect exploitation attempts targeting the vulnerable Legal Hold plugin endpoints (see rules section).</li>
<li>Monitor Mattermost server logs for unusual API requests to the Legal Hold plugin, specifically those resulting in unexpected data access or modification, as a potential sign of exploitation (webserver log source).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>mattermost</category><category>authentication-bypass</category><category>legal-hold</category></item></channel></rss>