Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:alpm/archlinux/mattermost@5.26.1-1
purl pkg:alpm/archlinux/mattermost@5.26.1-1
Next non-vulnerable version 5.26.2-1
Latest non-vulnerable version 5.39.2-1
Risk 4.5
Vulnerabilities affecting this package (3)
Vulnerability Summary Fixed by
VCID-4ndn-vpw4-17gz
Aliases:
CVE-2020-29510
go: encoding/xml: XML directives instability
5.26.2-1
Affected by 0 other vulnerabilities.
VCID-qway-uy4e-vucf
Aliases:
CVE-2020-29511
go: encoding/xml: XML element instability
5.26.2-1
Affected by 0 other vulnerabilities.
VCID-w8xe-6aaj-aycr
Aliases:
CVE-2020-29509
GHSA-xhqq-x44f-9fgg
Authentication Bypass in github.com/russellhaering/gosaml2 ### Impact Given a valid SAML Response, it may be possible for an attacker to mutate the XML document in such a way that gosaml2 will trust a different portion of the document than was signed. Depending on the implementation of the Service Provider this enables a variety of attacks, including users accessing accounts other than the one to which they authenticated in the Identity Provider, or full authentication bypass. ### Patches Service Providers utilizing gosaml2 should upgrade to v0.6.0 or greater.
5.26.2-1
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T18:26:58.357421+00:00 Arch Linux Importer Affected by VCID-w8xe-6aaj-aycr https://security.archlinux.org/AVG-1358 38.0.0
2026-04-01T18:26:58.335219+00:00 Arch Linux Importer Affected by VCID-4ndn-vpw4-17gz https://security.archlinux.org/AVG-1358 38.0.0
2026-04-01T18:26:58.313499+00:00 Arch Linux Importer Affected by VCID-qway-uy4e-vucf https://security.archlinux.org/AVG-1358 38.0.0