{"id":"CVE-2026-2461","details":"Mattermost Plugins versions \u003c=11.3 11.0.3 11.2.2 10.10.11.0 fail to implement authorisation checks on comment block modifications, which allows an authorised attacker with editor permission to modify comments created by other board members.  Mattermost Advisory ID: MMSA-2025-00559","aliases":["GHSA-hf8w-x9h5-5gf9","GO-2026-4782"],"modified":"2026-04-10T05:39:28.025754Z","published":"2026-03-16T14:19:29.753Z","related":["SUSE-SU-2026:1135-1"],"references":[{"type":"ADVISORY","url":"https://mattermost.com/security-updates"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/mattermost/mattermost-server","events":[{"introduced":"0"},{"fixed":"fddd4a70bcb32eaff394a2fa5399efcd1b2ae251"},{"introduced":"0"},{"last_affected":"feb598ed2b7ac3cb78a253b032ad7e4628b0de00"},{"introduced":"e62f350cd7a896c45a0e025f44cb8915f5597854"},{"fixed":"005521aa79666e6960bc3302f6172b810f6bff3a"},{"introduced":"d27a2195068ddfa3ce17cf470f9739e4edb94b83"},{"fixed":"4082c3dcf285e4d1a386d2ef37f14f39dc5a0094"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"10.11.11"},{"introduced":"11.0.0"},{"last_affected":"11.0.3"},{"introduced":"11.1.0"},{"fixed":"11.2.3"},{"introduced":"11.3.0"},{"fixed":"11.3.1"}]}}],"versions":["@mattermost/client@10.11.0","@mattermost/client@11.3.0","@mattermost/types@10.11.0","@mattermost/types@11.3.0","cloud-2022-07-20-1","cloud-2022-08-10-1","cloud-2022-09-08-1","cloud-2022-10-06-1","cloud-2022-11-11-1","cloud-2022-11-24-1","mattermost-redux@10.11.0","mattermost-redux@11.3.0","preview-v0.1","server/public/v0.0.10","server/public/v0.0.11","server/public/v0.0.12","server/public/v0.0.13","server/public/v0.0.14","server/public/v0.0.15","server/public/v0.0.16","server/public/v0.0.17","server/public/v0.0.18","server/public/v0.0.5","server/public/v0.0.6","server/public/v0.0.7","server/public/v0.0.8","server/public/v0.0.9","server/public/v0.1.0","server/public/v0.1.1","server/public/v0.1.10","server/public/v0.1.11","server/public/v0.1.12","server/public/v0.1.13","server/public/v0.1.14","server/public/v0.1.15","server/public/v0.1.16","server/public/v0.1.17","server/public/v0.1.18","server/public/v0.1.19","server/public/v0.1.2","server/public/v0.1.20","server/public/v0.1.21","server/public/v0.1.3","server/public/v0.1.4","server/public/v0.1.5","server/public/v0.1.6","server/public/v0.1.7","server/public/v0.1.8","server/public/v0.1.9","v0.5.0","v10.11.0","v10.11.0-rc1","v10.11.0-rc2","v10.11.0-rc3","v10.11.1","v10.11.1-rc1","v10.11.10","v10.11.11-rc1","v10.11.2","v10.11.2-rc1","v10.11.2-rc2","v10.11.3","v10.11.4","v10.11.4-rc1","v10.11.4-rc2","v10.11.4-rc3","v10.11.5","v10.11.6","v10.11.7","v10.11.8","v10.11.9","v10.11.9-rc1","v11.0.0-alpha.1","v11.0.1","v11.0.1-rc1","v11.0.1-rc2","v11.0.1-rc3","v11.0.2","v11.0.3","v11.0.3-rc1","v11.2.0","v11.2.0-rc1","v11.2.0-rc2","v11.2.0-rc3","v11.2.1","v11.2.1-rc1","v11.2.2","v11.3.0","v11.3.0-rc3","v11.3.0-rc4","v11.3.1-rc1","v4.10.0-rc1","v4.2.0-rc1","v4.3.0-rc1","v4.4.0-rc1","v4.5.0-rc1","v4.6.0-rc1","v4.6.0-rc2","v4.7.0-rc1","v4.8.0-rc1","v4.9.0-rc1","v5.0.0-rc1","v5.1.0-rc1","v5.2.0-rc1","v5.2.0-rc2"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-2461.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"}]}