CVE-2022-2406
Mattermost vulnerability analysis and mitigation

Overview

The legacy Slack import feature in Mattermost version 6.7.0 and earlier contains a vulnerability that fails to properly limit the sizes of imported files, potentially allowing authenticated users to exploit this limitation (NVD).

Technical details

The vulnerability is classified as CWE-770 (Resource Exhaustion), which is a more specific classification than the initially assigned CWE-400 (Uncontrolled Resource Consumption) (NVD CNA Status).

Impact

This vulnerability could potentially lead to resource exhaustion in affected Mattermost installations when processing imported Slack files (NVD).

Mitigation and workarounds

Users should upgrade to a version newer than 6.7.0 to address this vulnerability (NVD).

Additional resources


SourceThis report was generated using AI

Related Mattermost vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-4981CRITICAL9.9
  • MattermostMattermost
  • cpe:2.3:a:mattermost:mattermost
NoYesJun 20, 2025
CVE-2024-8071HIGH7.2
  • MattermostMattermost
  • github.com/mattermost/mattermost
NoYesAug 22, 2024
CVE-2024-42411MEDIUM5.3
  • MattermostMattermost
  • mattermost
NoYesAug 22, 2024
CVE-2024-43813MEDIUM4.3
  • MattermostMattermost
  • mattermost
NoYesAug 22, 2024
CVE-2024-10214LOW3.5
  • MattermostMattermost
  • govulncheck-vulndb
NoYesOct 28, 2024

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management