Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-6333— SSRF via Host Header Spoofing in Custom Slash Commands

CVSS 3.5 · Low

Affected Version Matrix 5

VendorProductVersion RangeStatus
MattermostMattermost11.5.0≤ 11.5.1affected
10.11.0≤ 10.11.13affected
11.6.0unaffected
11.5.2unaffected
10.11.14unaffected
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-6333

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
SSRF via Host Header Spoofing in Custom Slash Commands
Source: NVD (National Vulnerability Database)
Vulnerability Description
Mattermost versions 11.5.x <= 11.5.1, 10.11.x <= 10.11.13 fail to validate the Host header when constructing response URLs for custom slash commands which allows an authenticated attacker to redirect slash command responses to an attacker-controlled server via a spoofed Host header.. Mattermost Advisory ID: MMSA-2026-00582
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
服务端请求伪造(SSRF)
Source: NVD (National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
MattermostMattermost 11.5.0 ~ 11.5.1 -

II. Public POCs for CVE-2026-6333

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-6333

登录查看更多情报信息。

Same Patch Batch · Mattermost · 2026-05-18 · 21 CVEs total

CVE-2026-63468.7 HIGHSensitive credentials exposed in plaintext in Mattermost support packets
CVE-2026-63477.6 HIGHMattermost Calls plugin exposes TURN server credentials in plaintext in support packets
CVE-2026-34716.5 MEDIUMOpening a window with {{javascript:alert()}} as URL causes crash in the Mattermost Desktop
CVE-2026-63456.5 MEDIUMPrevent password disclosure and force reset during Slack import
CVE-2026-51636.5 MEDIUMMissing authorization check in AI message rewrite endpoint allows access to private thread
CVE-2026-31176.5 MEDIUMInstance and webhook GitLab plugin commands were able to be run by non-admin users
CVE-2026-23254.3 MEDIUMImproper Input Validation in MS Teams Meetings API Handler
CVE-2026-36374.3 MEDIUMMattermost fails to enforce create_post permission when editing posts
CVE-2026-63424.3 MEDIUMGroup prefix matching bypass for subscriptions
CVE-2026-63414.3 MEDIUMIncomplete group locking implementation
CVE-2026-63404.3 MEDIUMMemory Exhaustion via Malicious 7zip File Upload
CVE-2026-63394.3 MEDIUMMissing request origin validation on burn-on-read reveal endpoint
CVE-2026-287594.3 MEDIUMInsufficient authorization in shared channel membership sync allows remote cluster to remo
CVE-2026-63434.3 MEDIUMMattermost Playbooks Plugin fails to enforce view permissions in list endpoints, allowing
CVE-2026-287324.3 MEDIUMSlash command trigger-word update allowed command hijacking
CVE-2026-34953.8 LOWUnescaped variables during error page composition
CVE-2026-42733.7 LOWInsufficient token rotation validation in remote cluster invite confirmation
CVE-2026-46433.5 LOWCalling window.close() from server-side content causes crash in the Mattermost Desktop App
CVE-2026-42863.1 LOWPlaybooks Plugin fails to validate team transfers, allowing unauthorized removal of member
CVE-2026-63343.1 LOWOAuth authorization code client binding not enforced during token redemption in Mattermost

IV. Related Vulnerabilities

V. Comments for CVE-2026-6333

No comments yet


Leave a comment