{"id":"CVE-2024-50336","summary":"matrix-js-sdk has insufficient MXC URI validation which allows client-side path traversal","details":"matrix-js-sdk is a Matrix messaging protocol Client-Server SDK for JavaScript. matrix-js-sdk before 34.11.0 is vulnerable to client-side path traversal via crafted MXC URIs. A malicious room member can trigger clients based on the matrix-js-sdk to issue arbitrary authenticated GET requests to the client's homeserver. Fixed in matrix-js-sdk 34.11.1.","aliases":["GHSA-xvg8-m4x3-w6xr"],"modified":"2026-03-01T02:46:34.240605Z","published":"2024-11-12T16:38:53.164Z","related":["MGASA-2024-0395","SUSE-SU-2024:4326-1","openSUSE-SU-2024:14584-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/50xxx/CVE-2024-50336.json","cna_assigner":"GitHub_M","cwe_ids":["CWE-22"]},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/50xxx/CVE-2024-50336.json"},{"type":"ADVISORY","url":"https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-xvg8-m4x3-w6xr"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00004.html"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50336"},{"type":"WEB","url":"https://spec.matrix.org/v1.12/client-server-api/#security-considerations-5"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/matrix-org/matrix-js-sdk","events":[{"introduced":"0"},{"fixed":"b4c4355d1a34dd3e4b22467f556eebe368768ea5"}]}],"versions":["no-media-devices-release","v0.1.0","v0.1.1","v0.10.0","v0.10.0-rc.1","v0.10.0-rc.2","v0.10.1","v0.10.2","v0.10.2-rc.1","v0.10.3","v0.10.3-rc.1","v0.10.4","v0.10.4-rc.1","v0.10.5","v0.10.5-rc.1","v0.10.6","v0.10.6-rc.1","v0.10.7","v0.10.7-rc.1","v0.10.8","v0.10.8-rc.1","v0.10.9","v0.10.9-rc.1","v0.10.9-rc.2","v0.11.0","v0.11.0-rc.1","v0.11.1","v0.11.1-rc.1","v0.12.0","v0.12.0-rc.1","v0.12.1","v0.12.1-rc.1","v0.13.0","v0.13.1","v0.14.0","v0.14.0-rc.1","v0.14.1","v0.14.2","v0.14.2-rc.1","v0.2.0","v0.2.1","v0.2.2","v0.3.0","v0.4.0","v0.4.1","v0.4.2","v0.5.0","v0.5.1","v0.5.2","v0.5.3","v0.5.4","v0.5.5","v0.5.6","v0.6.0-rc1","v0.6.0-rc2","v0.6.1","v0.6.2","v0.6.3","v0.6.4","v0.6.4-rc.1","v0.6.4-rc.2","v0.7.0","v0.7.1","v0.7.1-rc.1","v0.7.10","v0.7.11","v0.7.11-rc.1","v0.7.12","v0.7.12-rc.1","v0.7.13","v0.7.2","v0.7.3","v0.7.4","v0.7.4-rc.1","v0.7.5","v0.7.5-rc.1","v0.7.5-rc.2","v0.7.5-rc.3","v0.7.6","v0.7.6-rc.1","v0.7.6-rc.2","v0.7.7","v0.7.7-rc.1","v0.7.8","v0.7.8-rc.1","v0.7.9","v0.8.0","v0.8.1","v0.8.1-rc.1","v0.8.2","v0.8.3","v0.8.3-rc.1","v0.8.4","v0.8.5","v0.8.5-rc.1","v0.9.0","v0.9.0-rc.1","v0.9.1","v0.9.2","v1.0.0","v1.0.0-rc.1","v1.0.0-rc.2","v1.0.1","v1.0.1-rc.1","v1.0.1-rc.2","v1.0.2","v1.0.2-rc.1","v1.0.3","v1.0.3-rc.1","v1.0.4","v1.1.0","v1.1.0-rc.1","v1.2.0","v1.2.0-rc.1","v10.0.0","v10.0.0-rc.1","v10.1.0","v10.1.0-rc.1","v11.0.0","v11.0.0-rc.1","v11.1.0","v11.1.0-rc.1","v11.2.0","v11.2.0-rc.1","v12.0.0","v12.0.0-rc.1","v12.0.1","v12.0.1-rc.1","v12.1.0","v12.1.0-rc.1","v12.2.0","v12.2.0-rc.1","v12.3.0","v12.3.0-rc.1","v12.3.0-rc.2","v12.3.1","v12.4.0","v12.4.0-rc.1","v12.4.1","v12.5.0","v12.5.0-rc.1","v13.0.0","v13.0.0-rc.1","v14.0.0","v14.0.0-rc.1","v14.0.0-rc.2","v14.0.1","v15.0.0","v15.0.0-rc.1","v15.1.0","v15.1.0-rc.1","v15.1.1","v15.1.1-rc.1","v15.2.0","v15.2.0-rc.1","v15.2.1","v15.3.0","v15.3.0-rc.1","v15.4.0","v15.4.0-rc.1","v15.5.0","v15.5.0-rc.1","v15.5.1","v15.5.1-rc.1","v15.5.2","v15.6.0","v15.6.0-rc.1","v16.0.0","v16.0.0-rc.1","v16.0.1","v16.0.1-rc.1","v16.0.2-rc.1","v17.0.0","v17.0.0-rc.1","v17.0.0-rc.2","v17.0.0-rc.3","v17.1.0","v17.1.0-rc.1","v17.2.0","v17.2.0-rc.1","v18.0.0","v18.0.0-rc.1","v18.0.0-rc.2","v18.1.0","v18.1.0-rc.1","v19.0.0","v19.0.0-rc.1","v19.1.0","v19.1.0-rc.1","v19.2.0","v19.2.0-rc.1","v19.3.0","v19.3.0-rc.1","v19.3.0-rc.2","v19.4.0","v19.4.0-rc.1","v19.5.0","v19.5.0-rc.1","v19.5.0-rc.2","v19.5.0-rc.3","v19.5.0-rc.4","v19.6.0","v19.6.0-rc.1","v19.7.0","v2.0.0","v2.0.1","v2.0.1-rc.1","v2.0.1-rc.2","v2.1.0","v2.1.0-rc.1","v2.1.1","v2.2.0","v2.2.0-rc.1","v2.2.0-rc.2","v2.3.0","v2.3.0-rc.1","v2.3.1","v2.3.1-rc.1","v2.3.2","v2.3.2-rc.1","v2.4.0","v2.4.0-rc.1","v2.4.1","v2.4.2","v2.4.2-rc.1","v2.4.3","v2.4.3-rc.1","v2.4.4","v2.4.4-rc.1","v2.4.5","v2.4.6","v2.4.6-rc.1","v20.0.0","v20.0.1","v20.0.2","v20.1.0","v20.1.0-rc.1","v20.1.0-rc.2","v21.0.0","v21.0.0-rc.1","v21.0.0-rc.2","v21.0.1","v21.1.0","v21.1.0-rc.1","v21.2.0","v21.2.0-rc.1","v22.0.0","v22.0.0-rc.1","v22.0.0-rc.2","v23.0.0","v23.0.0-rc.1","v23.1.0","v23.1.0-rc.1","v23.1.0-rc.2","v23.1.0-rc.3","v23.1.0-rc.4","v23.1.1","v23.2.0","v23.2.0-rc.1","v23.3.0","v23.3.0-rc.1","v23.4.0","v23.4.0-rc.1","v23.4.0-rc.2","v23.5.0","v23.5.0-rc.1","v24.0.0","v24.1.0","v24.1.0-rc.1","v25.0.0","v25.0.0-rc.1","v25.1.0","v25.1.0-rc.1","v25.1.1","v25.2.0-rc.1","v25.2.0-rc.2","v25.2.0-rc.4","v25.2.0-rc.5","v26.0.0","v26.0.0-rc.1","v26.0.1","v26.1.0","v26.1.0-patch.1","v26.1.0-rc1","v26.2.0","v26.2.0-no-media-devices-hotfix","v26.2.0-rc.1","v27.0.0","v27.0.0-rc.1","v27.0.0-rc.2","v27.1.0","v27.1.0-rc.1","v27.2.0","v27.2.0-rc.1","v27.3.0-rc.1","v28.0.0","v28.0.0-rc.1","v28.1.0","v28.1.0-rc.1","v28.2.0","v28.2.0-rc.1","v29.0.0","v29.0.0-rc.1","v29.1.0","v29.1.0-rc.1","v3.0.0","v3.0.0-rc.1","v3.42.2-rc.3","v30.0.0","v30.0.0-rc.1","v30.0.1","v30.1.0","v30.1.0-rc.0","v30.1.0-rc.1","v30.2.0","v30.2.0-rc.0","v30.3.0","v30.3.0-rc.0","v31.0.0","v31.0.0-rc.0","v31.1.0","v31.2.0","v31.2.0-rc.0","v31.3.0","v31.3.0-rc.0","v31.3.0-rc.1","v31.3.0-rc.2","v31.3.0-rc.3","v31.3.0-rc.4","v31.4.0","v31.4.0-rc.0","v31.5.0","v31.5.0-rc.0","v31.6.0","v31.6.0-rc.0","v31.6.1","v32.0.0","v32.0.0-rc.0","v32.1.0","v32.1.0-rc.0","v32.2.0","v32.2.0-rc.0","v32.3.0","v32.3.0-rc.0","v32.4.0","v33.0.0","v33.0.0-rc.0","v33.1.0","v33.1.0-rc.0","v33.1.0-rc.1","v34.0.0","v34.0.0-rc.0","v34.0.0-rc.1","v34.1.0","v34.1.0-rc.0","v34.1.0-rc.1","v34.1.0-rc.2","v34.1.0-rc.3","v34.10.0","v34.10.0-rc.0","v34.11.0","v34.2.0","v34.2.0-rc.0","v34.3.0","v34.3.0-rc.0","v34.3.0-rc.1","v34.3.1","v34.4.0","v34.4.0-rc.0","v34.4.0-rc.1","v34.5.0","v34.5.0-rc.0","v34.6.0","v34.6.0-rc.0","v34.7.0","v34.7.0-rc.0","v34.8.0","v34.9.0","v34.9.0-rc.0","v4.0.0","v4.0.0-rc.1","v5.0.0","v5.0.0-rc.1","v5.0.1","v5.1.0","v5.1.0-rc.1","v5.1.1","v5.1.1-rc.1","v5.2.0","v5.2.0-rc.1","v5.3.0-rc.1","v5.3.1-rc.1","v5.3.1-rc.2","v5.3.1-rc.3","v5.3.1-rc.4","v6.0.0","v6.0.0-rc.1","v6.0.0-rc.2","v6.1.0","v6.1.0-rc.1","v6.2.0","v6.2.0-rc.1","v6.2.1","v6.2.2","v7.0.0","v7.0.0-rc.1","v7.1.0","v7.1.0-rc.1","v8.0.0","v8.0.1","v8.0.1-rc.1","v8.1.0","v8.1.0-rc.1","v8.2.0","v8.2.0-rc.1","v8.3.0","v8.3.0-rc.1","v8.4.0","v8.4.0-rc.1","v8.4.1","v8.5.0","v8.5.0-rc.1","v9.0.0","v9.0.0-rc.1","v9.0.1","v9.1.0","v9.1.0-rc.1","v9.10.0","v9.10.0-rc.1","v9.11.0","v9.11.0-rc.1","v9.2.0","v9.2.0-rc.1","v9.3.0","v9.3.0-rc.1","v9.4.0","v9.4.0-rc.1","v9.4.0-rc.2","v9.4.1","v9.5.0","v9.5.0-rc.1","v9.5.1","v9.6.0","v9.6.0-rc.1","v9.7.0","v9.7.0-rc.1","v9.8.0","v9.8.0-rc.1","v9.9.0","v9.9.0-rc.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-50336.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N"}]}