Incorrect default configuration for trusted IP header in Mattermost version 6.7.0 and earlier allows attacker to bypass some of the rate limitations in place or use manipulated IPs for audit logging via manipulating the request headers.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://mattermost.com/security-updates/ |
|
History
Wed, 25 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Incorrect defaults can cause attackers to bypass rate limitations | Incorrect defaults can cause attackers to bypass rate limitations |
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Fri, 06 Dec 2024 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Mattermost
Published: 2022-07-11T14:08:50.000Z
Updated: 2024-12-06T23:08:46.139Z
Reserved: 2022-07-11T00:00:00.000Z
Link: CVE-2022-2366
Updated: 2024-08-03T00:32:09.696Z
Status : Modified
Published: 2022-07-12T14:15:15.743
Modified: 2024-11-21T07:00:50.860
Link: CVE-2022-2366
No data.