CVE-2026-2476
Improper Masking in Mattermost Plugins β€2.0.3 Exposes Sensitive Data
Publication date: 2026-03-16
Last updated on: 2026-03-20
Assigner: Mattermost, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| mattermost | ms_teams | to 2.3.1 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-200 | The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
Mattermost Plugins versions up to 2.0.3.0 do not properly mask sensitive configuration values. This means that an attacker who has access to support packets can retrieve the original plugin settings by exporting configuration data.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know
How can this vulnerability impact me? :
This vulnerability can lead to exposure of sensitive configuration information to unauthorized users who have access to support packets. Such exposure can compromise the confidentiality of critical plugin settings, potentially allowing attackers to gain insights into system configurations or exploit other weaknesses.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know