{"id":"GO-2026-4477","summary":"Mattermost Server vulnerable to user account takeover when Single Sign-On OAuth2 is used in github.com/mattermost/mattermost-server","details":"Mattermost Server vulnerable to user account takeover when Single Sign-On OAuth2 is used in github.com/mattermost/mattermost-server.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/mattermost/mattermost-server before v3.9.2-0.20170714134023-b17fca0d5ee7.","aliases":["CVE-2017-18906","GHSA-fpcr-4rr5-hpcp"],"modified":"2026-02-19T20:41:01.127939Z","published":"2026-02-17T18:09:06Z","database_specific":{"url":"https://pkg.go.dev/vuln/GO-2026-4477","review_status":"UNREVIEWED"},"references":[{"type":"ADVISORY","url":"https://github.com/advisories/GHSA-fpcr-4rr5-hpcp"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-18906"},{"type":"WEB","url":"https://github.com/mattermost/mattermost/commit/259ad46f30d0fac2f7c5c14f3b76b2170f7e90c7"},{"type":"WEB","url":"https://github.com/mattermost/mattermost/commit/b17fca0d5ee7557e3df1cf1d1da8bd749859e35f"},{"type":"WEB","url":"https://github.com/mattermost/mattermost/commit/fbc170733e86f09b46ba754dd03304733d2f482f"},{"type":"WEB","url":"https://mattermost.com/security-updates"}],"affected":[{"package":{"name":"github.com/mattermost/mattermost-server","ecosystem":"Go","purl":"pkg:golang/github.com/mattermost/mattermost-server"},"ranges":[{"type":"SEMVER","events":[{"introduced":"3.10.0+incompatible"},{"fixed":"3.10.2+incompatible"}]}],"ecosystem_specific":{"custom_ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.9.2-0.20170714134023-b17fca0d5ee7"}]}]},"database_specific":{"source":"https://vuln.go.dev/ID/GO-2026-4477.json"}}],"schema_version":"1.7.3"}