CVE-2026-24661
Received Received - Intake
Denial of Service via Oversized Payload in Mattermost Plugins

Publication date: 2026-04-09

Last updated on: 2026-04-17

Assigner: Mattermost, Inc.

Description
Mattermost Plugins versions <=2.1.3.0 fail to limit the request body size on the {{/changes}} webhook endpoint which allows an authenticated attacker to cause memory exhaustion and denial of service via sending an oversized JSON payload. Mattermost Advisory ID: MMSA-2026-00611
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-09
Last Modified
2026-04-17
Generated
2026-05-07
AI Q&A
2026-04-09
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
mattermost mattermost to 2.3.2.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-770 The product allocates a reusable resource or group of resources on behalf of an actor without imposing any intended restrictions on the size or number of resources that can be allocated.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in Mattermost Plugins versions up to 2.1.3.0 where the {{/changes}} webhook endpoint does not limit the size of the request body. An authenticated attacker can exploit this by sending an oversized JSON payload, which can cause memory exhaustion and lead to a denial of service.


How can this vulnerability impact me? :

The impact of this vulnerability is primarily a denial of service condition. By sending an oversized JSON payload to the vulnerable endpoint, an attacker can exhaust the server's memory resources, potentially causing the service to crash or become unresponsive.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart