CVE-2023-28427
JavaScript vulnerability analysis and mitigation

Overview

The vulnerability (CVE-2023-28427) affects matrix-js-sdk, a Matrix messaging protocol Client-Server SDK for JavaScript, in versions prior to 24.0.0. The vulnerability was discovered by the Matrix Security Team and disclosed on March 28, 2023. The issue affects systems using the matrix-js-sdk library, including applications like Thunderbird that bundle the Matrix SDK (Matrix Blog, Mozilla Advisory).

Technical details

The vulnerability involves prototype pollution through events containing special strings in key locations, which can temporarily disrupt the normal functioning of matrix-js-sdk. The issue has been assigned a CVSS v3.1 base score of 8.2 (High) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H. The vulnerability is classified as CWE-1321 (Improperly Controlled Modification of Object Prototype Attributes) (GitHub Advisory, NVD).

Impact

The vulnerability can cause the matrix-js-sdk to malfunction, potentially impacting the consumer's ability to process data safely. While the primary demonstrated impact is denial-of-service, the extensive attack surface means more severe impacts cannot be completely ruled out. The SDK may appear to be operating normally but could be excluding or corrupting runtime data presented to the consumer (Matrix Blog, GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in matrix-js-sdk version 24.0.0. There are no known workarounds for this vulnerability, and users are strongly advised to upgrade to the patched version (GitHub Advisory).

Community reactions

The vulnerability has received attention from major Linux distributions and software vendors. Debian, Red Hat, and Gentoo have issued security advisories and patches for affected packages, particularly focusing on Thunderbird which bundles the affected SDK (Debian Advisory, Red Hat Advisory, Gentoo Advisory).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-67731HIGH8.7
  • JavaScriptJavaScript
  • servify-express
NoYesDec 12, 2025
CVE-2025-67718HIGH8.7
  • JavaScriptJavaScript
  • formio
NoYesDec 11, 2025
CVE-2025-8083HIGH8.6
  • JavaScriptJavaScript
  • vuetify
NoYesDec 12, 2025
CVE-2025-67750HIGH8.4
  • JavaScriptJavaScript
  • lightning-flow-scanner
NoYesDec 12, 2025
CVE-2025-8082MEDIUM6.3
  • JavaScriptJavaScript
  • vuetify
NoYesDec 12, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management