Back to VulnFeed / CVE-2026-6347
root@hackertop:~/vulnfeed/CVE-2026-6347#
CVE-2026-6347 MEDIUM CVE ⚠ Unpatched · Zero-day◉ PoC 公开 Lifecycle 4/7

Mattermost up to 10.11.13/11.4.3/11.5.1 Calls Plugin plaintext information disclosure

Mattermost 3d ago Impact pending confirmation
LIFECYCLE
5.1 CVSS
Vulnerability Detail Mitigation Lifecycle CVSS Assessment
Vulnerability Description
A vulnerability was found in Mattermost up to 10.11.13/11.4.3/11.5.1 (Groupware Software). It has been rated as problematic. This issue affects an unknown functionality of the component Calls Plugin. Upgrading to version 10.11.14, 11.4.4, 11.5.2 or 11.6.0 eliminates this vulnerability.
Root Cause Analysis
The manipulation of the argument plaintext with an unknown input leads to a unknown weakness. Using CWE to declare the problem leads to CWE-200. The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.

Impact: Impacted is confidentiality.

Countermeasure: Upgrading to version 10.11.14, 11.4.4, 11.5.2 or 11.6.0 eliminates this vulnerability.
Validation (PoC/EXP) - Looking for Contributors
No public PoC yet

Public validation traces already exist. Community contributors can extend them with richer reproduction content.

Contribute Your PoC/EXP
Log in to contribute PoC/EXP content. Log in
Back to VulnFeed
CVE-2026-6347 · CVSS 5.1 · Active Threat