CVE-2026-2455 PUBLISHED

SSRF bypass via IPv4-mapped IPv6 literals

Assigner: Mattermost
Reserved: 13.02.2026 Published: 16.03.2026 Updated: 16.03.2026

Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2, 10.11.x <= 10.11.10 fail to canonicalize IPv4-mapped IPv6 addresses before reserved IP validation which allows an attacker to perform SSRF attacks against internal services via IPv4-mapped IPv6 literals (e.g., [::ffff:127.0.0.1]).. Mattermost Advisory ID: MMSA-2026-00585

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CVSS Score: 4.3

Product Status

Vendor Mattermost
Product Mattermost
Versions Default: unaffected
  • affected from 11.3.0 to 11.3.0 (incl.)
  • affected from 11.2.0 to 11.2.2 (incl.)
  • affected from 10.11.0 to 10.11.10 (incl.)
  • Version 11.4.0 is unaffected
  • Version 11.3.1 is unaffected
  • Version 11.2.3 is unaffected
  • Version 10.11.11 is unaffected

Solutions

Update Mattermost to versions 11.4.0, 11.3.1, 11.2.3, 10.11.11 or higher.

Credits

  • winfunc finder

References

Problem Types

  • CWE-918: Server-Side Request Forgery (SSRF) CWE