Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-2027 | matrix-react-sdk is a react-based SDK for inserting a Matrix chat/voip client into a web page. The Export Chat feature includes certain attacker-controlled elements in the generated document without sufficient escaping, leading to stored Cross site scripting (XSS). Since the Export Chat feature generates a separate document, an attacker can only inject code run from the `null` origin, restricting the impact. However, the attacker can still potentially use the XSS to leak message contents. A malicious homeserver is a potential attacker since the affected inputs are controllable server-side. This issue has been addressed in commit `22fcd34c60` which is included in release version 3.76.0. Users are advised to upgrade. The only known workaround for this issue is to disable or to not use the Export Chat feature. |
Github GHSA |
GHSA-c9vx-2g7w-rp65 | matrix-react-sdk vulnerable to XSS in Export Chat feature |
Fri, 18 Oct 2024 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-10-18T17:24:35.910Z
Reserved: 2023-06-29T19:35:26.436Z
Link: CVE-2023-37259
Updated: 2024-08-02T17:09:33.537Z
Status : Modified
Published: 2023-07-18T17:15:11.490
Modified: 2024-11-21T08:11:19.710
Link: CVE-2023-37259
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA