{"id":"CVE-2024-53920","details":"In elisp-mode.el in GNU Emacs before 30.1, a user who chooses to invoke elisp-completion-at-point (for code completion) on untrusted Emacs Lisp source code can trigger unsafe Lisp macro expansion that allows attackers to execute arbitrary code. (This unsafe expansion also occurs if a user chooses to enable on-the-fly diagnosis that byte compiles untrusted Emacs Lisp source code.)","modified":"2026-04-16T04:33:01.574523995Z","published":"2024-11-27T15:15:26.837Z","related":["ALSA-2025:11030","ALSA-2025:4787","ALSA-2025:9448","SUSE-SU-2024:4392-1","SUSE-SU-2025:0798-1","openSUSE-SU-2024:14591-1"],"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/02/msg00033.html"},{"type":"WEB","url":"https://git.savannah.gnu.org/cgit/emacs.git/tag/?h=emacs-30.0.92"},{"type":"WEB","url":"https://git.savannah.gnu.org/cgit/emacs.git/tree/etc/NEWS?h=emacs-30.1"},{"type":"ADVISORY","url":"https://eshelyaron.com/posts/2024-11-27-emacs-aritrary-code-execution-and-how-to-avoid-it.html"},{"type":"ADVISORY","url":"https://git.savannah.gnu.org/cgit/emacs.git/tree/ChangeLog.4"},{"type":"REPORT","url":"https://news.ycombinator.com/item?id=42256409"},{"type":"ARTICLE","url":"https://yhetil.org/emacs/CAFXAjY5f4YfHAtZur1RAqH34UbYU56_t6t2Er0YEh1Sb7-W=hg@mail.gmail.com/"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-53920.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"30.1"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}