Lookup for vulnerable packages by Package URL.
| Purl | pkg:npm/matrix-react-sdk@0.8.7 |
| Type | npm |
| Namespace | |
| Name | matrix-react-sdk |
| Version | 0.8.7 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | true |
| Next_non_vulnerable_version | 3.105.1 |
| Latest_non_vulnerable_version | 3.105.1 |
| Affected_by_vulnerabilities |
| 0 |
| url |
VCID-1g1f-1x88-tbg5 |
| vulnerability_id |
VCID-1g1f-1x88-tbg5 |
| summary |
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
matrix-react-sdk is a react-based SDK for inserting a Matrix chat/VoIP client into a web page. Prior to version 3.71.0, plain text messages containing HTML tags are rendered as HTML in the search results. To exploit this, an attacker needs to trick a user into searching for a specific message containing an HTML injection payload. No cross-site scripting attack is possible due to the hardcoded content security policy. Version 3.71.0 of the SDK patches over the issue. As a workaround, restarting the client will clear the HTML injection. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-30609 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.6537 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.65449 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.65438 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.65402 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.65429 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.65443 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.65424 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.65361 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.65396 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.65413 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-30609 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-30609, GHSA-xv83-x443-7rmw
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1g1f-1x88-tbg5 |
|
| 1 |
| url |
VCID-3s7z-6bqr-rqd1 |
| vulnerability_id |
VCID-3s7z-6bqr-rqd1 |
| summary |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
matrix-react-sdk is a Matrix chat protocol SDK for React Javascript. In certain configurations, data sent by remote servers containing special strings in key locations could cause modifications of the `Object.prototype`, disrupting matrix-react-sdk functionality, causing denial of service and potentially affecting program logic. This is fixed in matrix-react-sdk 3.69.0 and users are advised to upgrade. There are no known workarounds for this vulnerability. Note this advisory is distinct from GHSA-2x9c-qwgf-94xr which refers to a similar issue. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-28103 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00598 |
| scoring_system |
epss |
| scoring_elements |
0.69447 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00598 |
| scoring_system |
epss |
| scoring_elements |
0.69341 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00598 |
| scoring_system |
epss |
| scoring_elements |
0.69358 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00598 |
| scoring_system |
epss |
| scoring_elements |
0.69338 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00598 |
| scoring_system |
epss |
| scoring_elements |
0.69388 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00598 |
| scoring_system |
epss |
| scoring_elements |
0.69404 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00598 |
| scoring_system |
epss |
| scoring_elements |
0.69426 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00598 |
| scoring_system |
epss |
| scoring_elements |
0.69411 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00598 |
| scoring_system |
epss |
| scoring_elements |
0.69397 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00598 |
| scoring_system |
epss |
| scoring_elements |
0.69436 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-28103 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-28103, GHSA-6g43-88cp-w5gv
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3s7z-6bqr-rqd1 |
|
| 2 |
| url |
VCID-4kgp-rhzw-dqhu |
| vulnerability_id |
VCID-4kgp-rhzw-dqhu |
| summary |
User content sandbox can be confused into opening arbitrary documents
### Impact
The user content sandbox can be abused to trick users into opening unexpected documents after several user interactions. The content can be opened with a `blob` origin from the Matrix client, so it is possible for a malicious document to access user messages and secrets.
### Patches
This has been fixed by https://github.com/matrix-org/matrix-react-sdk/pull/5657, which is included in 3.15.0.
### Workarounds
There are no known workarounds. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-21320 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39429 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39479 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39507 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39455 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.3933 |
| published_at |
2026-04-01T12:55:00Z |
|
| 5 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.395 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39492 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39515 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39485 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39473 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39511 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-21320 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-21320, GHSA-52mq-6jcv-j79x
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4kgp-rhzw-dqhu |
|
| 3 |
| url |
VCID-k3ft-j7d1-nkh7 |
| vulnerability_id |
VCID-k3ft-j7d1-nkh7 |
| summary |
Matrix SDK for React's URL preview setting for a room is controllable by the homeserver
### Impact
A malicious homeserver could manipulate a user's account data to cause the client to enable URL previews in end-to-end encrypted rooms, in which case any URLs in encrypted messages would be sent to the server.
Even if the CVSS score would be 4.1 ([AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N&version=3.1)) the maintainer classifies this as High severity issue.
### Patches
This was patched in matrix-react-sdk 3.105.1.
### Workarounds
Deployments that trust their homeservers, as well as closed federations of trusted servers, are not affected.
### References
N/A. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-42347 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00766 |
| scoring_system |
epss |
| scoring_elements |
0.7343 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00766 |
| scoring_system |
epss |
| scoring_elements |
0.73499 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00766 |
| scoring_system |
epss |
| scoring_elements |
0.7349 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00766 |
| scoring_system |
epss |
| scoring_elements |
0.73448 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00766 |
| scoring_system |
epss |
| scoring_elements |
0.73456 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00766 |
| scoring_system |
epss |
| scoring_elements |
0.73476 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00766 |
| scoring_system |
epss |
| scoring_elements |
0.73453 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00766 |
| scoring_system |
epss |
| scoring_elements |
0.73439 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00766 |
| scoring_system |
epss |
| scoring_elements |
0.73402 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00766 |
| scoring_system |
epss |
| scoring_elements |
0.73407 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-42347 |
|
| 1 |
|
| 2 |
| reference_url |
https://github.com/matrix-org/matrix-react-sdk/releases/tag/v3.105.1 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N |
|
| 1 |
| value |
7.7 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N |
|
| 2 |
| value |
5.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N/U:Red |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 4 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-08T18:48:06Z/ |
|
|
| url |
https://github.com/matrix-org/matrix-react-sdk/releases/tag/v3.105.1 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-42347, GHSA-f83w-wqhc-cfp4
|
| risk_score |
3.5 |
| exploitability |
0.5 |
| weighted_severity |
6.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-k3ft-j7d1-nkh7 |
|
| 4 |
| url |
VCID-ybpz-t956-k7fb |
| vulnerability_id |
VCID-ybpz-t956-k7fb |
| summary |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
matrix-react-sdk is a Matrix chat protocol SDK for React Javascript. Events sent with special strings in key places can temporarily disrupt or impede the matrix-react-sdk from functioning properly, such as by causing room or event tile crashes. The remainder of the application can appear functional, though certain rooms/events will not be rendered. This issue has been fixed in matrix-react-sdk 3.53.0 and users are advised to upgrade. There are no known workarounds for this vulnerability. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-36060 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00424 |
| scoring_system |
epss |
| scoring_elements |
0.62213 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.00424 |
| scoring_system |
epss |
| scoring_elements |
0.62243 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00424 |
| scoring_system |
epss |
| scoring_elements |
0.62236 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00424 |
| scoring_system |
epss |
| scoring_elements |
0.62192 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.0044 |
| scoring_system |
epss |
| scoring_elements |
0.63138 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.0044 |
| scoring_system |
epss |
| scoring_elements |
0.63167 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.0044 |
| scoring_system |
epss |
| scoring_elements |
0.63132 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.0044 |
| scoring_system |
epss |
| scoring_elements |
0.63184 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.0044 |
| scoring_system |
epss |
| scoring_elements |
0.63201 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.0044 |
| scoring_system |
epss |
| scoring_elements |
0.63219 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-36060 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-36060, GHSA-2x9c-qwgf-94xr
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ybpz-t956-k7fb |
|
|
| Fixing_vulnerabilities |
|
| Risk_score | 4.0 |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:npm/matrix-react-sdk@0.8.7 |