{"id":"CVE-2023-28427","summary":"Prototype pollution in matrix-js-sdk","details":"matrix-js-sdk is a Matrix messaging protocol Client-Server SDK for JavaScript. In versions prior to 24.0.0 events sent with special strings in key places can temporarily disrupt or impede the matrix-js-sdk from functioning properly, potentially impacting the consumer's ability to process data safely. Note that the matrix-js-sdk can appear to be operating normally but be excluding or corrupting runtime data presented to the consumer. This vulnerability is distinct from GHSA-rfv9-x7hh-xc32 which covers a similar issue. The issue has been patched in matrix-js-sdk 24.0.0 and users are advised to upgrade. There are no known workarounds for this vulnerability.","aliases":["GHSA-mwq8-fjpf-c2gr"],"modified":"2026-04-16T04:35:54.554807642Z","published":"2023-03-28T20:32:22.116Z","related":["ALSA-2023:1802","ALSA-2023:1809","SUSE-SU-2023:1736-1","openSUSE-SU-2024:12823-1","openSUSE-SU-2024:12852-1"],"database_specific":{"cna_assigner":"GitHub_M","cwe_ids":["CWE-1321"],"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/28xxx/CVE-2023-28427.json"},"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2023/04/msg00027.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/28xxx/CVE-2023-28427.json"},{"type":"ADVISORY","url":"https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-mwq8-fjpf-c2gr"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-28427"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202305-36"},{"type":"ADVISORY","url":"https://www.debian.org/security/2023/dsa-5392"},{"type":"ARTICLE","url":"https://matrix.org/blog/2023/03/28/security-releases-matrix-js-sdk-24-0-0-and-matrix-react-sdk-3-69-0"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/matrix-org/matrix-js-sdk","events":[{"introduced":"0"},{"fixed":"c87048bd9f6e01681ec1ea048101ab4b3a6215e3"}]}],"versions":["v0.1.0","v0.1.1","v0.10.2","v0.10.2-rc.1","v0.10.3","v0.10.3-rc.1","v0.10.5","v0.10.5-rc.1","v0.10.7","v0.10.7-rc.1","v0.11.0","v0.11.0-rc.1","v0.2.0","v0.2.1","v0.2.2","v0.4.1","v0.4.2","v0.5.0","v0.5.1","v0.5.2","v0.5.3","v0.5.4","v0.5.5","v0.5.6","v0.6.0-rc1","v0.6.0-rc2","v0.6.1","v0.6.2","v0.6.4","v0.6.4-rc.2","v0.7.1-rc.1","v0.7.10","v0.7.2","v0.7.4","v0.7.4-rc.1","v0.7.9","v0.8.0","v0.8.1","v0.8.1-rc.1","v0.8.2","v0.8.3","v0.8.3-rc.1","v1.0.0","v1.0.0-rc.1","v1.0.0-rc.2","v2.0.1","v2.0.1-rc.1","v2.0.1-rc.2","v2.4.1","v23.5.0","v23.5.0-rc.1","v5.0.1","v7.1.0","v7.1.0-rc.1","v8.0.0","v8.1.0","v8.1.0-rc.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-28427.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H"}]}