{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-2454","assignerOrgId":"9302f53e-dde5-4bf3-b2f2-a83f91ac0eee","state":"PUBLISHED","assignerShortName":"Mattermost","dateReserved":"2026-02-13T10:11:47.778Z","datePublished":"2026-03-16T20:10:16.644Z","dateUpdated":"2026-03-17T13:37:43.947Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Mattermost","vendor":"Mattermost","versions":[{"lessThanOrEqual":"11.3.0","status":"affected","version":"11.3.0","versionType":"semver"},{"lessThanOrEqual":"11.2.2","status":"affected","version":"11.2.0","versionType":"semver"},{"lessThanOrEqual":"10.11.10","status":"affected","version":"10.11.0","versionType":"semver"},{"version":"11.4.0","status":"unaffected"},{"version":"11.3.1","status":"unaffected"},{"version":"11.2.3","status":"unaffected"},{"version":"10.11.11","status":"unaffected"}]}],"credits":[{"lang":"en","type":"finder","value":"National Security Agency"}],"descriptions":[{"lang":"en","value":"Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2, 10.11.x <= 10.11.10 fail to handle incorrectly reported array lengths which allows malicious user to cause OOM errors and crash the server via sending corrupted msgpack frames within websocket messages to calls plugin. Mattermost Advisory ID: MMSA-2025-00537"}],"metrics":[{"cvssV3_1":{"attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW","version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L","baseSeverity":"MEDIUM","baseScore":5.8},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"lang":"en","type":"CWE","description":"CWE-1287: Improper Validation of Specified Type of Input","cweId":"CWE-1287"}]}],"references":[{"url":"https://mattermost.com/security-updates","name":"MMSA-2025-00537","tags":["vendor-advisory"]}],"solutions":[{"value":"Update Mattermost to versions 11.4.0, 11.3.1, 11.2.3, 10.11.11 or higher.","lang":"en"}],"source":{"advisory":"MMSA-2025-00537","defect":["https://mattermost.atlassian.net/browse/MM-66166"],"discovery":"EXTERNAL"},"title":"DoS in Calls plugin via malformed msgpack in websocket request.","providerMetadata":{"orgId":"9302f53e-dde5-4bf3-b2f2-a83f91ac0eee","shortName":"Mattermost","dateUpdated":"2026-03-16T20:10:16.644Z"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-17T13:37:37.264945Z","id":"CVE-2026-2454","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-17T13:37:43.947Z"}}]}}