Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4069-1 | emacs security update |
Debian DSA |
DSA-5871-1 | emacs security update |
EUVD |
EUVD-2024-52189 | In elisp-mode.el in GNU Emacs before 30.1, a user who chooses to invoke elisp-completion-at-point (for code completion) on untrusted Emacs Lisp source code can trigger unsafe Lisp macro expansion that allows attackers to execute arbitrary code. (This unsafe expansion also occurs if a user chooses to enable on-the-fly diagnosis that byte compiles untrusted Emacs Lisp source code.) |
Ubuntu USN |
USN-8011-1 | Emacs vulnerabilities |
Mon, 03 Nov 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Tue, 13 May 2025 06:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:rhel_eus:9.4 |
Mon, 12 May 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat
Redhat enterprise Linux Redhat rhel Eus |
|
| CPEs | cpe:/a:redhat:enterprise_linux:9 cpe:/a:redhat:rhel_eus:9.2 |
|
| Vendors & Products |
Redhat
Redhat enterprise Linux Redhat rhel Eus |
Wed, 30 Apr 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:gnu:emacs:*:*:*:*:*:*:*:* |
Tue, 04 Mar 2025 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Sat, 01 Mar 2025 05:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In elisp-mode.el in GNU Emacs through 30.0.92, a user who chooses to invoke elisp-completion-at-point (for code completion) on untrusted Emacs Lisp source code can trigger unsafe Lisp macro expansion that allows attackers to execute arbitrary code. (This unsafe expansion also occurs if a user chooses to enable on-the-fly diagnosis that byte compiles untrusted Emacs Lisp source code.) | In elisp-mode.el in GNU Emacs before 30.1, a user who chooses to invoke elisp-completion-at-point (for code completion) on untrusted Emacs Lisp source code can trigger unsafe Lisp macro expansion that allows attackers to execute arbitrary code. (This unsafe expansion also occurs if a user chooses to enable on-the-fly diagnosis that byte compiles untrusted Emacs Lisp source code.) |
| References |
|
Mon, 02 Dec 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gnu
Gnu emacs |
|
| CPEs | cpe:2.3:a:gnu:emacs:-:*:*:*:*:*:*:* | |
| Vendors & Products |
Gnu
Gnu emacs |
|
| Metrics |
cvssV3_1
|
ssvc
|
Fri, 29 Nov 2024 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Thu, 28 Nov 2024 01:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | emacs: arbitrary code execution via Lisp macro expansion | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Wed, 27 Nov 2024 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 27 Nov 2024 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In elisp-mode.el in GNU Emacs through 30.0.92, a user who chooses to invoke elisp-completion-at-point (for code completion) on untrusted Emacs Lisp source code can trigger unsafe Lisp macro expansion that allows attackers to execute arbitrary code. (This unsafe expansion also occurs if a user chooses to enable on-the-fly diagnosis that byte compiles untrusted Emacs Lisp source code.) | |
| References |
|
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-11-03T20:48:26.643Z
Reserved: 2024-11-25T00:00:00.000Z
Link: CVE-2024-53920
Updated: 2024-12-02T16:57:47.483Z
Status : Modified
Published: 2024-11-27T15:15:26.837
Modified: 2025-11-03T21:17:48.003
Link: CVE-2024-53920
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN