Lookup for vulnerable packages by Package URL.
| Purl | pkg:npm/matrix-react-sdk@3.70.0-rc.1 |
| Type | npm |
| Namespace | |
| Name | matrix-react-sdk |
| Version | 3.70.0-rc.1 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | true |
| Next_non_vulnerable_version | 3.105.1 |
| Latest_non_vulnerable_version | 3.105.1 |
| Affected_by_vulnerabilities |
| 0 |
| url |
VCID-1g1f-1x88-tbg5 |
| vulnerability_id |
VCID-1g1f-1x88-tbg5 |
| summary |
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
matrix-react-sdk is a react-based SDK for inserting a Matrix chat/VoIP client into a web page. Prior to version 3.71.0, plain text messages containing HTML tags are rendered as HTML in the search results. To exploit this, an attacker needs to trick a user into searching for a specific message containing an HTML injection payload. No cross-site scripting attack is possible due to the hardcoded content security policy. Version 3.71.0 of the SDK patches over the issue. As a workaround, restarting the client will clear the HTML injection. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-30609 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.6537 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.65449 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.65438 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.65402 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.65429 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.65443 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.65424 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.65361 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.65396 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.65413 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-30609 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-30609, GHSA-xv83-x443-7rmw
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1g1f-1x88-tbg5 |
|
| 1 |
| url |
VCID-e42f-h16f-gkbf |
| vulnerability_id |
VCID-e42f-h16f-gkbf |
| summary |
Malicious homeservers can steal message keys when the matrix-react-sdk user invites another user to a room
### Impact
matrix-react-sdk before 3.102.0 allows a malicious homeserver to potentially steal message keys for a room when a user invites another user to that room, via injection of a malicious device controlled by the homeserver. This is possible because matrix-react-sdk before 3.102.0 shared historical message keys on invite.
### Patches
matrix-react-sdk 3.102.0 [disables sharing message keys on invite](https://github.com/matrix-org/matrix-react-sdk/pull/12618) by removing calls to the vulnerable functionality.
### Workarounds
None.
### References
The vulnerability in matrix-react-sdk is caused by calling `MatrixClient.sendSharedHistoryKeys` in matrix-js-sdk, which is inherently vulnerable to this sort of attack. This matrix-js-sdk vulnerability is tracked as CVE-2024-47080 / [GHSA-4jf8-g8wp-cx7c](https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-4jf8-g8wp-cx7c). Given that this functionality is not specific to sharing message keys on *invite*, is optional, has to be explicitly called by the caller and has been independently patched in matrix-react-sdk by removing the offending calls, we believe it is proper to treat the matrix-react-sdk vulnerability as a separate one, with its own advisory and CVE.
The matrix-org/matrix-react-sdk repository has recently been archived and the project was moved to [element-hq/matrix-react-sdk](https://github.com/element-hq/matrix-react-sdk). Given that this happened *after* the first patched release, no releases of the project on [element-hq/matrix-react-sdk](https://github.com/element-hq/matrix-react-sdk) were ever vulnerable to this vulnerability.
Patching pull request: https://github.com/matrix-org/matrix-react-sdk/pull/12618.
### For more information
If you have any questions or comments about this advisory, please email us at security at [security at matrix.org](mailto:security@matrix.org). |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-47824 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00526 |
| scoring_system |
epss |
| scoring_elements |
0.66969 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.00526 |
| scoring_system |
epss |
| scoring_elements |
0.67053 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00526 |
| scoring_system |
epss |
| scoring_elements |
0.67039 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00526 |
| scoring_system |
epss |
| scoring_elements |
0.67006 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00526 |
| scoring_system |
epss |
| scoring_elements |
0.67036 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00526 |
| scoring_system |
epss |
| scoring_elements |
0.67051 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00526 |
| scoring_system |
epss |
| scoring_elements |
0.67031 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00526 |
| scoring_system |
epss |
| scoring_elements |
0.67019 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00526 |
| scoring_system |
epss |
| scoring_elements |
0.66995 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-47824 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-47824, GHSA-qcvh-p9jq-wp8v
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-e42f-h16f-gkbf |
|
| 2 |
| url |
VCID-k3ft-j7d1-nkh7 |
| vulnerability_id |
VCID-k3ft-j7d1-nkh7 |
| summary |
Matrix SDK for React's URL preview setting for a room is controllable by the homeserver
### Impact
A malicious homeserver could manipulate a user's account data to cause the client to enable URL previews in end-to-end encrypted rooms, in which case any URLs in encrypted messages would be sent to the server.
Even if the CVSS score would be 4.1 ([AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N&version=3.1)) the maintainer classifies this as High severity issue.
### Patches
This was patched in matrix-react-sdk 3.105.1.
### Workarounds
Deployments that trust their homeservers, as well as closed federations of trusted servers, are not affected.
### References
N/A. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-42347 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00766 |
| scoring_system |
epss |
| scoring_elements |
0.7343 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00766 |
| scoring_system |
epss |
| scoring_elements |
0.73499 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00766 |
| scoring_system |
epss |
| scoring_elements |
0.7349 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00766 |
| scoring_system |
epss |
| scoring_elements |
0.73448 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00766 |
| scoring_system |
epss |
| scoring_elements |
0.73456 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00766 |
| scoring_system |
epss |
| scoring_elements |
0.73476 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00766 |
| scoring_system |
epss |
| scoring_elements |
0.73453 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00766 |
| scoring_system |
epss |
| scoring_elements |
0.73439 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00766 |
| scoring_system |
epss |
| scoring_elements |
0.73402 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00766 |
| scoring_system |
epss |
| scoring_elements |
0.73407 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-42347 |
|
| 1 |
|
| 2 |
| reference_url |
https://github.com/matrix-org/matrix-react-sdk/releases/tag/v3.105.1 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N |
|
| 1 |
| value |
7.7 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N |
|
| 2 |
| value |
5.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N/U:Red |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 4 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-08T18:48:06Z/ |
|
|
| url |
https://github.com/matrix-org/matrix-react-sdk/releases/tag/v3.105.1 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-42347, GHSA-f83w-wqhc-cfp4
|
| risk_score |
3.5 |
| exploitability |
0.5 |
| weighted_severity |
6.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-k3ft-j7d1-nkh7 |
|
| 3 |
| url |
VCID-kgyw-t9rt-vkfg |
| vulnerability_id |
VCID-kgyw-t9rt-vkfg |
| summary |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
matrix-react-sdk is a react-based SDK for inserting a Matrix chat/voip client into a web page. The Export Chat feature includes certain attacker-controlled elements in the generated document without sufficient escaping, leading to stored Cross site scripting (XSS). Since the Export Chat feature generates a separate document, an attacker can only inject code run from the `null` origin, restricting the impact. However, the attacker can still potentially use the XSS to leak message contents. A malicious homeserver is a potential attacker since the affected inputs are controllable server-side. This issue has been addressed in commit `22fcd34c60` which is included in release version 3.76.0. Users are advised to upgrade. The only known workaround for this issue is to disable or to not use the Export Chat feature. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-37259 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00193 |
| scoring_system |
epss |
| scoring_elements |
0.41315 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00193 |
| scoring_system |
epss |
| scoring_elements |
0.41349 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00193 |
| scoring_system |
epss |
| scoring_elements |
0.41328 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00193 |
| scoring_system |
epss |
| scoring_elements |
0.4132 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00193 |
| scoring_system |
epss |
| scoring_elements |
0.41269 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00193 |
| scoring_system |
epss |
| scoring_elements |
0.41344 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47527 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47468 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47474 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47534 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-37259 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-37259, GHSA-c9vx-2g7w-rp65
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kgyw-t9rt-vkfg |
|
|
| Fixing_vulnerabilities |
|
| Risk_score | 4.0 |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:npm/matrix-react-sdk@3.70.0-rc.1 |