CVE-2026-0999

5.4 MEDIUM

📋 TL;DR

This vulnerability allows authenticated users to bypass SSO-only login requirements in Mattermost by using userID-based authentication. It affects Mattermost instances configured to enforce SSO-only login. Attackers could gain unauthorized access to accounts that should only be accessible via SSO.

💻 Affected Systems

Products:
  • Mattermost
Versions: 11.1.x <= 11.1.2, 10.11.x <= 10.11.9, 11.2.x <= 11.2.1
Operating Systems: All platforms running Mattermost
Default Config Vulnerable: ✅ No
Notes: Only affects instances with SSO-only login restrictions enabled. Default configurations without SSO enforcement are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could gain unauthorized access to user accounts that should be protected by SSO, potentially accessing sensitive communications, files, and administrative functions.

🟠

Likely Case

Internal users bypass SSO requirements to access accounts they shouldn't have access to, potentially violating access control policies and compliance requirements.

🟢

If Mitigated

With proper monitoring and access controls, unauthorized access attempts can be detected and blocked before significant damage occurs.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated access but the bypass mechanism appears straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 11.1.3, 10.11.10, 11.2.2 or later

Vendor Advisory: https://mattermost.com/security-updates

Restart Required: Yes

Instructions:

1. Backup your Mattermost instance and database. 2. Download the patched version from Mattermost releases. 3. Stop the Mattermost service. 4. Install the patched version. 5. Restart the Mattermost service. 6. Verify the version is updated.

🔧 Temporary Workarounds

Disable SSO-only restrictions temporarily

all

Temporarily allow non-SSO authentication methods until patching can be completed

Edit mattermost config.json: set 'EnableSignInWithUsername' and 'EnableSignInWithEmail' to true

🧯 If You Can't Patch

  • Implement additional authentication monitoring and alerting for suspicious login patterns
  • Enforce strict access controls and review user permissions regularly

🔍 How to Verify

Check if Vulnerable:

Check Mattermost version via System Console > About or run: mattermost version

Check Version:

mattermost version

Verify Fix Applied:

Verify version is 11.1.3+, 10.11.10+, or 11.2.2+ and test SSO-only login enforcement

📡 Detection & Monitoring

Log Indicators:

  • Failed SSO authentication attempts followed by successful userID-based logins
  • Multiple login attempts from same user via different authentication methods

Network Indicators:

  • Unusual authentication traffic patterns
  • Login requests bypassing SSO endpoints

SIEM Query:

source="mattermost" AND (event="login" OR event="authentication") AND method!="sso" AND result="success"

🔗 References

📤 Share & Export