vulnerability
Arch Linux: Insufficient validation (CVE-2021-32659)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 3 | (AV:N/AC:M/Au:S/C:N/I:P/A:N) | Jun 16, 2021 | Jul 11, 2025 | Nov 27, 2025 |
Severity
3
CVSS
(AV:N/AC:M/Au:S/C:N/I:P/A:N)
Published
Jun 16, 2021
Added
Jul 11, 2025
Modified
Nov 27, 2025
Description
In versions 2.6.0 and earlier of matrix-appservice-bridge, as included in matrix-appservice-irc before version 0.27.0, if a bridge has room upgrade handling turned on in the configuration (the `roomUpgradeOpts` key when instantiating a new `Bridge` instance.), any `m.room.tombstone` event it encounters will be used to unbridge the current room and bridge into the target room. However, the target room `m.room.create` event is not checked to verify if the `predecessor` field contains the previous room. This means that any malicious admin of a bridged room can repoint the traffic to a different room without the new room being aware. Versions 2.6.1 and greater are patched. As a workaround, disabling the automatic room upgrade handling can be done by removing the `roomUpgradeOpts` key from the `Bridge` class options.
Solution
arch-linux-upgrade-latest
References
- CVE-2021-32659
- https://attackerkb.com/topics/CVE-2021-32659
- URL-https://github.com/matrix-org/matrix-appservice-bridge/commit/b69e745584a34fcfd858df33e4631e420da07b9f
- URL-https://github.com/matrix-org/matrix-appservice-bridge/releases/tag/2.6.1
- URL-https://github.com/matrix-org/matrix-appservice-bridge/security/advisories/GHSA-35g4-qx3c-vjhx
- URL-https://security.archlinux.org/ASA-202106-51
- CWE-306
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.