Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Mattermost | Mattermost | 11.1.0 ~ 11.1.2 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-1046 | 7.6 HIGH | Arbitrary application execution via unvalidated server-controlled URLs in Help menu |
| CVE-2025-13821 | 5.7 MEDIUM | User profile update exposes password hash and MFA secrets |
| CVE-2026-0999 | 5.4 MEDIUM | Authentication bypass via userID login when email and username login are disabled |
| CVE-2025-14350 | 4.3 MEDIUM | Information disclosure via channel mentions in posts |
| CVE-2026-0997 | 4.3 MEDIUM | Mattermost Zoom Plugin channel preference API lacks authorization checks |
| CVE-2025-14573 | 3.8 LOW | Team Admin Bypass of Invite Permissions via allow_open_invite Field |
No comments yet