EUVD-2026-16234

| CVE-2026-3108 HIGH
2026-03-26 Mattermost GHSA-3439-vqgj-2gcf
8.0
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Patch Released
Apr 01, 2026 - 02:30 nvd
Patch available
Analysis Generated
Mar 26, 2026 - 16:45 vuln.today
EUVD ID Assigned
Mar 26, 2026 - 16:45 euvd
EUVD-2026-16234
CVE Published
Mar 26, 2026 - 16:16 nvd
HIGH 8.0

Description

Mattermost versions 11.2.x <= 11.2.2, 10.11.x <= 10.11.10, 11.4.x <= 11.4.0, 11.3.x <= 11.3.1 fail to sanitize user-controlled post content in the mmctl commands terminal output which allows attackers to manipulate administrator terminals via crafted messages containing ANSI and OSC escape sequences that enable screen manipulation, fake prompts, and clipboard hijacking.. Mattermost Advisory ID: MMSA-2026-00599

Analysis

Mattermost's mmctl command-line administration tool fails to sanitize ANSI and OSC escape sequences embedded in user-generated post content, enabling authenticated low-privilege attackers to inject malicious terminal control codes when administrators export or query messages. Exploitation allows screen manipulation, fake prompt injection, and clipboard hijacking against administrators running mmctl commands, potentially leading to secondary code execution if administrators are tricked into running injected commands. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: Identify all administrators with mmctl access and restrict command-line message export/query operations to isolated terminals without external access. Within 7 days: Document all mmctl usage and implement mandatory terminal safety training for administrators emphasizing verification of command sources before execution. …

Sign in for detailed remediation steps.

Priority Score

40
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +40
POC: 0

Vendor Status

Debian

Bug #823556
mattermost-server
Release Status Fixed Version Urgency
open - -

Share

EUVD-2026-16234 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy