{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-14T22:20:26.016","vulnerabilities":[{"cve":{"id":"CVE-2026-0998","sourceIdentifier":"responsibledisclosure@mattermost.com","published":"2026-02-16T10:16:07.983","lastModified":"2026-02-18T20:22:51.917","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Mattermost versions 11.1.x <= 11.1.2, 10.11.x <= 10.11.9, 11.2.x <= 11.2.1 and Mattermost Plugin Zoom versions <=1.11.0 fail to validate user identity and post ownership in the {{/api/v1/askPMI}} endpoint which allows unauthorized users to start Zoom meetings as any user and overwrite arbitrary posts via direct API calls with manipulated user IDs and post data.. Mattermost Advisory ID: MMSA-2025-00534"},{"lang":"es","value":"Las versiones de Mattermost 11.1.x &lt;= 11.1.2, 10.11.x &lt;= 10.11.9, 11.2.x &lt;= 11.2.1 y las versiones del plugin de Mattermost Zoom &lt;=1.11.0 no validan la identidad del usuario y la propiedad de la publicación en el endpoint {{/api/v1/askPMI}}, lo que permite a usuarios no autorizados iniciar reuniones de Zoom como cualquier usuario y sobrescribir publicaciones arbitrarias a través de llamadas directas a la API con ID de usuario y datos de publicación manipulados. ID de aviso de Mattermost: MMSA-2025-00534"}],"metrics":{"cvssMetricV31":[{"source":"responsibledisclosure@mattermost.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4}]},"weaknesses":[{"source":"responsibledisclosure@mattermost.com","type":"Secondary","description":[{"lang":"en","value":"CWE-862"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*","versionStartIncluding":"10.11.0","versionEndExcluding":"10.11.10","matchCriteriaId":"92B0F8BD-06A1-4B39-95C5-4FB5A195F1C4"},{"vulnerable":true,"criteria":"cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.0","versionEndExcluding":"11.1.3","matchCriteriaId":"F28AD5DC-E336-4DD3-BC31-AC924190433C"},{"vulnerable":true,"criteria":"cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*","versionStartIncluding":"11.2.0","versionEndExcluding":"11.2.2","matchCriteriaId":"D98EAFB2-8055-4893-835B-30A99ED97892"},{"vulnerable":true,"criteria":"cpe:2.3:a:mattermost:zoom:*:*:*:*:*:mattermost:*:*","versionEndIncluding":"1.11.0","matchCriteriaId":"795B314D-69ED-4BB3-9F72-C9441FFA3852"}]}]}],"references":[{"url":"https://mattermost.com/security-updates","source":"responsibledisclosure@mattermost.com","tags":["Vendor Advisory"]}]}}]}