matrix-js-sdk has insufficient MXC URI validation which allows client-side path traversal
- Severity:
- Medium
Description
matrix-js-sdk before 34.11.0 is vulnerable to client-side path traversal via crafted MXC URIs. A malicious room member can trigger clients based on the matrix-js-sdk to issue arbitrary authenticated GET requests to the client’s homeserver.
Recommendation
Update the matrix-js-sdk
package to the latest compatible version. Followings are version details:
- Affected version(s): < 34.11.1
- Patched version(s): 34.11.1
References
Related Issues
- matrix-js-sdk can be tricked into disclosing E2EE room keys to a participating homeserver - CVE-2021-40823
- Vega allows Cross-site Scripting via the vlSelectionTuples function (GHSA-mp7w-mhcv-673j) - CVE-2025-25304
- Matrix JavaScript SDK's key history sharing could share keys to malicious devices - CVE-2024-47080
- Vite before v2.9.13 vulnerable to directory traversal via crafted URL to victim's service - CVE-2022-35204
- Tags:
- npm
- matrix-js-sdk
Anything's wrong? Let us know Last updated on November 12, 2024