<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Mattermost — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/mattermost/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 06 Apr 2026 13:17:18 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/mattermost/feed.xml" rel="self" type="application/rss+xml"/><item><title>Mattermost Legal Hold Plugin Authentication Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-mattermost-legal-hold-auth-bypass/</link><pubDate>Mon, 06 Apr 2026 13:17:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-mattermost-legal-hold-auth-bypass/</guid><description>Mattermost Legal Hold plugin versions 1.1.4 and earlier allow authenticated attackers to bypass authorization checks, enabling unauthorized access and modification of legal hold data via crafted API requests.</description><content:encoded><![CDATA[<p>The Mattermost Legal Hold plugin, in versions 1.1.4 and earlier, contains an authentication bypass vulnerability (CVE-2026-3524) that can be exploited by authenticated attackers. The vulnerability lies in the ServeHTTP function, where a failed authorization check does not properly halt request processing. This flaw allows attackers to craft malicious API requests to the plugin&rsquo;s endpoints, enabling them to access, create, download, and delete legal hold data without proper authorization. The vulnerability is identified by Mattermost Advisory ID MMSA-2026-00621 and poses a significant risk to organizations using the affected plugin versions, potentially leading to data breaches and compliance violations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the Mattermost server with valid user credentials.</li>
<li>Attacker crafts a malicious API request targeting the Legal Hold plugin&rsquo;s endpoints.</li>
<li>The request is sent to the Mattermost server.</li>
<li>The ServeHTTP function in the Legal Hold plugin processes the request.</li>
<li>Authorization check fails due to insufficient privileges or incorrect parameters.</li>
<li>Instead of halting request processing, the plugin continues to execute the request.</li>
<li>The attacker gains unauthorized access to legal hold data or performs unauthorized actions (create, download, delete).</li>
<li>The attacker successfully exfiltrates or manipulates sensitive legal hold information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability (CVE-2026-3524) allows authenticated attackers to bypass authorization controls within the Mattermost Legal Hold plugin. This can result in unauthorized access, creation, modification, or deletion of sensitive legal hold data. The vulnerability affects versions 1.1.4 and earlier of the plugin. Organizations using the affected versions are at risk of data breaches, compliance violations, and reputational damage. A CVSS v3.1 score of 8.8 indicates a high level of severity due to the potential for significant data compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Mattermost Legal Hold plugin to a version later than 1.1.4 to remediate CVE-2026-3524.</li>
<li>Deploy the Sigma rules provided in this brief to detect exploitation attempts targeting the vulnerable Legal Hold plugin endpoints (see rules section).</li>
<li>Monitor Mattermost server logs for unusual API requests to the Legal Hold plugin, specifically those resulting in unexpected data access or modification, as a potential sign of exploitation (webserver log source).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>mattermost</category><category>authentication-bypass</category><category>legal-hold</category></item><item><title>Mattermost mmctl Terminal Injection Vulnerability (CVE-2026-3108)</title><link>https://feed.craftedsignal.io/briefs/2026-03-mattermost-terminal-injection/</link><pubDate>Thu, 26 Mar 2026 17:16:41 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-mattermost-terminal-injection/</guid><description>Mattermost versions 11.2.x &lt;= 11.2.2, 10.11.x &lt;= 10.11.10, 11.4.x &lt;= 11.4.0, 11.3.x &lt;= 11.3.1 are vulnerable to terminal injection, allowing attackers to manipulate administrator terminals via crafted messages containing ANSI and OSC escape sequences.</description><content:encoded><![CDATA[<p>CVE-2026-3108 affects Mattermost servers using the <code>mmctl</code> command-line tool. This vulnerability, disclosed in March 2026, stems from a failure to properly sanitize user-controlled post content within the terminal output of <code>mmctl</code> commands. Specifically, versions 11.2.x up to 11.2.2, 10.11.x up to 10.11.10, 11.4.x up to 11.4.0, and 11.3.x up to 11.3.1 are susceptible. An attacker leveraging this flaw can inject ANSI and OSC escape sequences into administrator terminals. These sequences enable…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-3108</category><category>mattermost</category><category>terminal-injection</category></item></channel></rss>