The Export Chat feature includes certain attacker-controlled elements in the generated document without sufficient escaping, leading to stored XSS.
Since the Export Chat feature generates a separate document, an attacker can only inject code run from the null
origin, restricting the impact.
However, the attacker can still potentially use the XSS to leak message contents. A malicious homeserver is a potential attacker since the affected inputs are controllable server-side.
This was patched in matrix-react-sdk 3.76.0.
None, other than not using the Export Chat feature.
N/A
{ "github_reviewed_at": "2023-07-18T16:58:01Z", "cwe_ids": [ "CWE-79", "CWE-80" ], "nvd_published_at": "2023-07-18T17:15:11Z", "severity": "MODERATE", "github_reviewed": true }