Mattermost versions 10.11.x <= 10.11.12, 11.5.x <= 11.5.0, 11.4.x <= 11.4.2, 11.3.x <= 11.3.2 fail to enforce atomic single-use consumption of guest magic link tokens, which allows an attacker with access to a valid magic link to establish multiple independent authenticated sessions via concurrent requests.. Mattermost Advisory ID: MMSA-2026-00624
References
| Link | Resource |
|---|---|
| https://mattermost.com/security-updates | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
22 Apr 2026, 19:41
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:* | |
| First Time |
Mattermost
Mattermost mattermost Server |
|
| References | () https://mattermost.com/security-updates - Vendor Advisory |
15 Apr 2026, 12:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-15 12:16
Updated : 2026-04-22 19:41
NVD link : CVE-2026-3590
Mitre link : CVE-2026-3590
CVE.ORG link : CVE-2026-3590
JSON object : View
Products Affected
mattermost
- mattermost_server
CWE
CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
