matrix-js-sdk can be tricked into disclosing E2EE room keys to a participating homeserver
- Severity:
- Medium
Description
A logic error in the room key sharing functionality of matrix-js-sdk before 12.4.1 allows a malicious Matrix homeserver† participating in an encrypted room to steal room encryption keys from affected Matrix clients participating in that room. This allows the homeserver to decrypt end-to-end encrypted messages sent by affected clients.
Recommendation
Update the matrix-js-sdk package to the latest compatible version. Followings are version details:
- Affected version(s): < 12.4.1
- Patched version(s): 12.4.1
References
- GHSA-23cm-x6j7-6hq3
- matrix.org
- CVE-2021-40823
- CWE-200
- CWE-327
- CAPEC-310
- OWASP 2021-A1
- OWASP 2021-A2
- OWASP 2021-A6
Related Issues
- matrix-js-sdk has insufficient validation when considering a room to be upgraded by another - CVE-2025-59160
- Improper beacon events in matrix-js-sdk can result in availability issues - CVE-2022-39236
- matrix-js-sdk will freeze when a user sets a room with itself as a its predecessor - CVE-2024-42369
- Matrix JavaScript SDK's key history sharing could share keys to malicious devices - CVE-2024-47080
- Tags:
- npm
- matrix-js-sdk
Anything's wrong? Let us know Last updated on August 08, 2023