Back to VulnFeed / CVE-2026-6343
root@hackertop:~/vulnfeed/CVE-2026-6343#
CVE-2026-6343 MEDIUM CVE ⚠ Unpatched · Zero-day◉ PoC 公开 Lifecycle 4/7

Mattermost up to 10.11.13/11.4.3/11.5.1/11.5.x authorization

Mattermost 3d ago Impact pending confirmation
LIFECYCLE
4.2 CVSS
Vulnerability Detail Mitigation Lifecycle CVSS Assessment
Vulnerability Description
A vulnerability has been found in Mattermost up to 10.11.13/11.4.3/11.5.1/11.5.x (Groupware Software) and classified as problematic. Affected by this vulnerability is an unknown code. Upgrading to version 10.11.14, 11.4.4, 11.5.2 or 11.6.0 eliminates this vulnerability.
Root Cause Analysis
The CWE definition for the vulnerability is CWE-863. The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions.

Impact: As an impact it is known to affect confidentiality.

Countermeasure: Upgrading to version 10.11.14, 11.4.4, 11.5.2 or 11.6.0 eliminates this vulnerability.
Validation (PoC/EXP) - Looking for Contributors
No public PoC yet

Public validation traces already exist. Community contributors can extend them with richer reproduction content.

Contribute Your PoC/EXP
Log in to contribute PoC/EXP content. Log in
Back to VulnFeed
CVE-2026-6343 · CVSS 4.2 · Active Threat