Mattermost has session spoofing due to lack of single-use consumption of guest magic link tokens enforcement
Moderate severity
GitHub Reviewed
Published
Apr 17, 2026
to the GitHub Advisory Database
•
Updated Apr 28, 2026
Package
Affected versions
>= 10.11.0-rc1, < 10.11.13
= 11.5.0-rc1
>= 11.4.0-rc1, < 11.4.3
>= 11.3.0-rc1, < 11.3.3
Patched versions
10.11.13
11.5.0
11.4.3
11.3.3
>= 8.0.0-20250721062209-4952acea88ce, < 8.0.0-20250723052842-4cb8d8940332
8.0.0-20250723052842-4cb8d8940332
Description
Published by the National Vulnerability Database
Apr 15, 2026
Published to the GitHub Advisory Database
Apr 17, 2026
Reviewed
Apr 28, 2026
Last updated
Apr 28, 2026
Mattermost versions 10.11.x <= 10.11.12, 11.5.x <= 11.5.0, 11.4.x <= 11.4.2, 11.3.x <= 11.3.2 fail to enforce atomic single-use consumption of guest magic link tokens, which allows an attacker with access to a valid magic link to establish multiple independent authenticated sessions via concurrent requests. Mattermost Advisory ID: MMSA-2026-00624.
References