Missing timestamp validation in Zoom webhook handler
Summary
| CVE | CVE-2026-3109 |
|---|---|
| State | PUBLISHED |
| Assigner | Mattermost |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-03-26 17:16:41 UTC |
| Updated | 2026-03-30 13:26:50 UTC |
| Description | Mattermost Plugins versions <=11.4 10.11.11.0 fail to validate webhook request timestamps which allows an attacker to corrupt Zoom meeting state in Mattermost via replayed webhook requests. Mattermost Advisory ID: MMSA-2026-00584 |
Risk And Classification
Primary CVSS: v3.1 2.2 LOW from [email protected]
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
EPSS: 0.000470000 probability, percentile 0.144650000 (date 2026-04-01)
Problem Types: CWE-754 | CWE-754 CWE-754: Improper Check for Unusual or Exceptional Conditions
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | [email protected] | Secondary | 2.2 | LOW | CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L |
| 3.1 | CNA | CVSS | 2.2 | LOW | CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L |
CVSS v3.1 Breakdown
Attack Vector
NetworkAttack Complexity
HighPrivileges Required
HighUser Interaction
NoneScope
UnchangedConfidentiality
NoneIntegrity
NoneAvailability
LowCVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Mattermost | Mattermost | affected 10.11.11 semver | Not specified |
| CNA | Mattermost | Mattermost | unaffected 11.5.0 | Not specified |
| CNA | Mattermost | Mattermost | unaffected 10.11.12 | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| mattermost.com/security-updates | [email protected] | mattermost.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
CNA: thecybertantrik (en)
Additional Advisory Data
Solutions
CNA: Update Mattermost Plugins to versions 11.5.0, 10.11.12 or higher.
There are currently no legacy QID mappings associated with this CVE.