CVE-2026-3590

Mattermost versions 10.11.x <= 10.11.12, 11.5.x <= 11.5.0, 11.4.x <= 11.4.2, 11.3.x <= 11.3.2 fail to enforce atomic single-use consumption of guest magic link tokens, which allows an attacker with access to a valid magic link to establish multiple independent authenticated sessions via concurrent requests.. Mattermost Advisory ID: MMSA-2026-00624
References
Link Resource
https://mattermost.com/security-updates Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*
cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*
cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*
cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*

History

22 Apr 2026, 19:41

Type Values Removed Values Added
CPE cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*
First Time Mattermost
Mattermost mattermost Server
References () https://mattermost.com/security-updates - () https://mattermost.com/security-updates - Vendor Advisory

15 Apr 2026, 12:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-15 12:16

Updated : 2026-04-22 19:41


NVD link : CVE-2026-3590

Mitre link : CVE-2026-3590

CVE.ORG link : CVE-2026-3590


JSON object : View

Products Affected

mattermost

  • mattermost_server
CWE
CWE-367

Time-of-check Time-of-use (TOCTOU) Race Condition