Description
The matrix-appservice-irc before version 2.0.0 can be exploited to leak the truncated body of a message if a malicious user sends a Matrix reply to an event ID they don’t have access to.
Recommendation
Update the matrix-appservice-irc
package to the latest compatible version. Followings are version details:
- Affected version(s): < 2.0.0
- Patched version(s): 2.0.0
References
Related Issues
- The AuthKit Remix Library renders sensitive auth data in HTML - CVE-2025-55009
- Strapi allows Server-Side Request Forgery in Webhook function - CVE-2024-52588
- Redoc Prototype Pollution via `Module.mergeObjects` Component - CVE-2024-57083
- Matrix IRC Bridge allows IRC command injection to own puppeted user - CVE-2025-27146
- Tags:
- npm
- matrix-appservice-irc
Anything's wrong? Let us know Last updated on April 15, 2024