Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1020 CNY

100%

CVE-2026-5163— Missing authorization check in AI message rewrite endpoint allows access to private thread content

CVSS 6.5 · Medium EPSS 0.04% · P12

Possible ATT&CK Techniques 1AI

T1530 · Data from Cloud Storage

Affected Version Matrix 3

VendorProductVersion RangeStatus
MattermostMattermost11.5.0≤ 11.5.1affected
11.6.0unaffected
11.5.2unaffected
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-5163

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Missing authorization check in AI message rewrite endpoint allows access to private thread content
Source: NVD (National Vulnerability Database)
Vulnerability Description
Mattermost versions 11.5.x <= 11.5.1 fail to verify channel membership when processing AI-assisted message rewrites which allows an authenticated attacker to read the content of threads in private channels and direct messages they do not have access to via a crafted request to the post rewrite endpoint.. Mattermost Advisory ID: MMSA-2026-00645
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
授权机制缺失
Source: NVD (National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
MattermostMattermost 11.5.0 ~ 11.5.1 -

II. Public POCs for CVE-2026-5163

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-5163

登录查看更多情报信息。

Same Patch Batch · Mattermost · 2026-05-18 · 21 CVEs total

CVE-2026-63468.7 HIGHSensitive credentials exposed in plaintext in Mattermost support packets
CVE-2026-63477.6 HIGHMattermost Calls plugin exposes TURN server credentials in plaintext in support packets
CVE-2026-34716.5 MEDIUMOpening a window with {{javascript:alert()}} as URL causes crash in the Mattermost Desktop
CVE-2026-31176.5 MEDIUMInstance and webhook GitLab plugin commands were able to be run by non-admin users
CVE-2026-63456.5 MEDIUMPrevent password disclosure and force reset during Slack import
CVE-2026-287324.3 MEDIUMSlash command trigger-word update allowed command hijacking
CVE-2026-63434.3 MEDIUMMattermost Playbooks Plugin fails to enforce view permissions in list endpoints, allowing
CVE-2026-287594.3 MEDIUMInsufficient authorization in shared channel membership sync allows remote cluster to remo
CVE-2026-23254.3 MEDIUMImproper Input Validation in MS Teams Meetings API Handler
CVE-2026-63394.3 MEDIUMMissing request origin validation on burn-on-read reveal endpoint
CVE-2026-63404.3 MEDIUMMemory Exhaustion via Malicious 7zip File Upload
CVE-2026-63414.3 MEDIUMIncomplete group locking implementation
CVE-2026-63424.3 MEDIUMGroup prefix matching bypass for subscriptions
CVE-2026-36374.3 MEDIUMMattermost fails to enforce create_post permission when editing posts
CVE-2026-34953.8 LOWUnescaped variables during error page composition
CVE-2026-42733.7 LOWInsufficient token rotation validation in remote cluster invite confirmation
CVE-2026-46433.5 LOWCalling window.close() from server-side content causes crash in the Mattermost Desktop App
CVE-2026-63333.5 LOWSSRF via Host Header Spoofing in Custom Slash Commands
CVE-2026-42863.1 LOWPlaybooks Plugin fails to validate team transfers, allowing unauthorized removal of member
CVE-2026-63343.1 LOWOAuth authorization code client binding not enforced during token redemption in Mattermost

IV. Related Vulnerabilities

V. Comments for CVE-2026-5163

No comments yet


Leave a comment