Back to VulnFeed / CVE-2026-6333
root@hackertop:~/vulnfeed/CVE-2026-6333#
CVE-2026-6333 MEDIUM SSRF ⚠ Unpatched · Zero-day◉ PoC 公开 Lifecycle 4/7

Mattermost up to 10.11.13/11.5.1 Slash Command server-side request forgery

Mattermost 3d ago Impact pending confirmation
LIFECYCLE
4.2 CVSS
Vulnerability Detail Mitigation Lifecycle CVSS Assessment
Vulnerability Description
A vulnerability, which was classified as critical, was found in Mattermost up to 10.11.13/11.5.1 (Groupware Software). Affected is an unknown part of the component Slash Command Handler. Upgrading to version 10.11.14, 11.5.2 or 11.6.0 eliminates this vulnerability.
Root Cause Analysis
CWE is classifying the issue as CWE-918. The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.

Impact: This is going to have an impact on confidentiality, integrity, and availability.

Countermeasure: Upgrading to version 10.11.14, 11.5.2 or 11.6.0 eliminates this vulnerability.
Validation (PoC/EXP) - Looking for Contributors
No public PoC yet

Public validation traces already exist. Community contributors can extend them with richer reproduction content.

Contribute Your PoC/EXP
Log in to contribute PoC/EXP content. Log in
Back to VulnFeed
CVE-2026-6333 · CVSS 4.2 · Active Threat