Vulnerabilites related to element-hq - element-x-android
CVE-2025-31127 (GCVE-0-2025-31127)
Vulnerability from cvelistv5
Published
2025-04-03 17:54
Modified
2025-04-07 18:24
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Summary
Element X Android is a Matrix Android Client provided by element.io. In Element X Android versions between 0.4.16 and 25.03.3, the entity in control of the element.json well-known file is able, under certain conditions, to get access to the media encryption keys used for an Element Call call. This vulnerability is fixed in 25.03.4.
References
▼ | URL | Tags |
---|---|---|
https://github.com/element-hq/element-x-android/security/advisories/GHSA-x2g5-f28j-p7w6 | x_refsource_CONFIRM | |
https://github.com/element-hq/element-meta/issues/2441 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
element-hq | element-x-android |
Version: >= 0.4.16, < 25.03.4 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-31127", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-07T18:24:36.927877Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-07T18:24:45.777Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "element-x-android", "vendor": "element-hq", "versions": [ { "status": "affected", "version": "\u003e= 0.4.16, \u003c 25.03.4" } ] } ], "descriptions": [ { "lang": "en", "value": "Element X Android is a Matrix Android Client provided by element.io. In Element X Android versions between 0.4.16 and 25.03.3, the entity in control of the element.json well-known file is able, under certain conditions, to get access to the media encryption keys used for an Element Call call. This vulnerability is fixed in 25.03.4." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-03T17:54:22.695Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/element-hq/element-x-android/security/advisories/GHSA-x2g5-f28j-p7w6", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/element-hq/element-x-android/security/advisories/GHSA-x2g5-f28j-p7w6" }, { "name": "https://github.com/element-hq/element-meta/issues/2441", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/element-hq/element-meta/issues/2441" } ], "source": { "advisory": "GHSA-x2g5-f28j-p7w6", "discovery": "UNKNOWN" }, "title": "Element X Android allows the entity in control of the well-known file to break the confidentiality embedded Element Call" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-31127", "datePublished": "2025-04-03T17:54:22.695Z", "dateReserved": "2025-03-26T15:04:52.626Z", "dateUpdated": "2025-04-07T18:24:45.777Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-27599 (GCVE-0-2025-27599)
Vulnerability from cvelistv5
Published
2025-04-18 15:49
Modified
2025-04-18 16:06
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Element X Android is a Matrix Android Client provided by element.io. Prior to version 25.04.2, a crafted hyperlink on a webpage, or a locally installed malicious app, can force Element X up to version 25.04.1 to load a webpage with similar permissions to Element Call and automatically grant it temporary access to microphone and camera. This issue has been patched in version 25.04.2.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
element-hq | element-x-android |
Version: < 25.04.2 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-27599", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-18T16:05:58.191971Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-18T16:06:04.952Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "element-x-android", "vendor": "element-hq", "versions": [ { "status": "affected", "version": "\u003c 25.04.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Element X Android is a Matrix Android Client provided by element.io. Prior to version 25.04.2, a crafted hyperlink on a webpage, or a locally installed malicious app, can force Element X up to version 25.04.1 to load a webpage with similar permissions to Element Call and automatically grant it temporary access to microphone and camera. This issue has been patched in version 25.04.2." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-926", "description": "CWE-926: Improper Export of Android Application Components", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20: Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-18T15:49:11.899Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/element-hq/element-x-android/security/advisories/GHSA-m5px-pwq3-4p5m", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/element-hq/element-x-android/security/advisories/GHSA-m5px-pwq3-4p5m" }, { "name": "https://github.com/element-hq/element-x-android/commit/dc058544d7e693c04298191c1aadd5b39c9be52e", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/element-hq/element-x-android/commit/dc058544d7e693c04298191c1aadd5b39c9be52e" }, { "name": "https://github.com/element-hq/element-x-android/releases/tag/v25.04.2", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/element-hq/element-x-android/releases/tag/v25.04.2" } ], "source": { "advisory": "GHSA-m5px-pwq3-4p5m", "discovery": "UNKNOWN" }, "title": "Element X Android vulnerable to loading malicious web pages via received intent" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-27599", "datePublished": "2025-04-18T15:49:11.899Z", "dateReserved": "2025-03-03T15:10:34.078Z", "dateUpdated": "2025-04-18T16:06:04.952Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }