Vulnerabilities > Mattermost > Mattermost Server > 8.1.0

DATE CVE VULNERABILITY TITLE RISK
2023-12-12 CVE-2023-49874 Unspecified vulnerability in Mattermost Server
Mattermost fails to check whether a user is a guest when updating the tasks of a private playbook run allowing a guest to update the tasks of a private playbook run if they know the run ID.
network
low complexity
mattermost
4.3
2023-12-12 CVE-2023-6547 Unspecified vulnerability in Mattermost Server
Mattermost fails to validate team membership when a user attempts to access a playbook, allowing a user with permissions to a playbook but no permissions to the team the playbook is on to access and modify the playbook.
network
low complexity
mattermost
5.4
2023-12-06 CVE-2023-6458 Injection vulnerability in Mattermost Server
Mattermost webapp fails to validate route parameters in/<TEAM_NAME>/channels/<CHANNEL_NAME> allowing an attacker to perform a client-side path traversal.
network
low complexity
mattermost CWE-74
critical
9.8
2023-12-06 CVE-2023-6459 Unspecified vulnerability in Mattermost Server
Mattermost is grouping calls in the /metrics endpoint by id and reports that id in the response.
network
low complexity
mattermost
5.3
2023-10-09 CVE-2023-5330 Allocation of Resources Without Limits or Throttling vulnerability in Mattermost Server
Mattermost fails to enforce a limit for the size of the cache entry for OpenGraph data allowing an attacker to send a specially crafted request to the /api/v4/opengraph filling the cache and turning the server unavailable.
network
low complexity
mattermost CWE-770
7.5
2023-10-09 CVE-2023-5331 Missing Authorization vulnerability in Mattermost Server
Mattermost fails to properly check the creator of an attached file when adding the file to a draft post, potentially exposing unauthorized file information.
network
low complexity
mattermost CWE-862
5.3
2023-10-09 CVE-2023-5333 Unspecified vulnerability in Mattermost Server
Mattermost fails to deduplicate input IDs allowing a simple user to cause the application to consume excessive resources and possibly crash by sending a specially crafted request to /api/v4/users/ids with multiple identical IDs.
network
low complexity
mattermost
6.5