{"id":"CVE-2023-30609","summary":"matrix-react-sdk vulnerable to HTML injection in search results via plaintext message highlighting","details":"matrix-react-sdk is a react-based SDK for inserting a Matrix chat/VoIP client into a web page. Prior to version 3.71.0, plain text messages containing HTML tags are rendered as HTML in the search results. To exploit this, an attacker needs to trick a user into searching for a specific message containing an HTML injection payload. No cross-site scripting attack is possible due to the hardcoded content security policy. Version 3.71.0 of the SDK patches over the issue. As a workaround, restarting the client will clear the HTML injection.","aliases":["GHSA-xv83-x443-7rmw"],"modified":"2026-04-10T04:57:24.063616Z","published":"2023-04-25T20:58:27.966Z","related":["openSUSE-SU-2024:12884-1","openSUSE-SU-2024:12895-1"],"database_specific":{"cwe_ids":["CWE-74"],"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/30xxx/CVE-2023-30609.json","cna_assigner":"GitHub_M"},"references":[{"type":"WEB","url":"https://github.com/matrix-org/matrix-react-sdk/releases/tag/v3.71.0"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/30xxx/CVE-2023-30609.json"},{"type":"ADVISORY","url":"https://github.com/matrix-org/matrix-react-sdk/security/advisories/GHSA-xv83-x443-7rmw"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-30609"},{"type":"FIX","url":"https://github.com/matrix-org/matrix-react-sdk/commit/bf182bc94556849d7acdfa0e5fdea2aa129ea826"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/matrix-org/matrix-react-sdk","events":[{"introduced":"0"},{"fixed":"3992c97fe22aaf7882f132ed8ee178b0a408a09b"}]}],"versions":["v0.0.2","v0.1.1","v0.10.2","v0.12.4","v0.12.4-rc.1","v0.12.4-rc.2","v0.12.4-rc.3","v0.12.4-rc.4","v0.12.4-rc.5","v0.12.4-rc.6","v0.12.5","v0.12.6","v0.12.6-rc.1","v0.2.0","v0.3.0","v0.3.1","v0.4.0","v0.5.0","v0.5.1","v0.5.2","v0.6.0","v0.6.1","v0.6.2","v0.6.3","v0.6.4","v0.6.4-r1","v0.6.5","v0.7.0-rc1","v0.7.0-rc2","v0.7.2","v0.7.3","v0.7.4","v0.7.5-rc.1","v0.8.0","v0.8.2","v0.8.3","v0.8.6-rc.1","v0.8.6-rc.2","v0.9.0","v0.9.0-rc.2","v0.9.1","v1.6.1","v1.7.2","v2.1.1","v2.2.2","v3.0.0","v3.71.0-rc.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-30609.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:L"}]}