CVE-2023-30609
JavaScript vulnerability analysis and mitigation

Overview

matrix-react-sdk, a react-based SDK for inserting a Matrix chat/VoIP client into a web page, was found to contain a vulnerability (CVE-2023-30609) prior to version 3.71.0. The vulnerability allowed plain text messages containing HTML tags to be rendered as HTML in the search results (NVD, GitHub Advisory).

Technical details

The vulnerability stems from improper neutralization of HTML elements in plaintext messages when displayed in search results. When a user searches for specific content, any HTML tags present in plaintext messages would be rendered as actual HTML rather than being escaped. The vulnerability has been assigned a CVSS v3.1 base score of 4.7 (MEDIUM) by NVD with a vector string of CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N, while GitHub assessed it with a score of 5.4 (MEDIUM) (NVD).

Impact

The vulnerability could allow an attacker to inject HTML content into the search results display. While cross-site scripting (XSS) attacks were limited due to the hardcoded content security policy, it was possible to include resources from recaptcha.net and gstatic.com which were included in the default CSP (GitHub Advisory).

Mitigation and workarounds

The vulnerability was patched in version 3.71.0 of the matrix-react-sdk. As a temporary workaround, users can restart the client to clear any HTML injection. Users are advised to upgrade to version 3.71.0 or later to fully address the vulnerability (GitHub Advisory).

Community reactions

The vulnerability was discovered by security researchers Cadence Ember, who found the injection vulnerability, and S1m, who identified possible XSS vectors (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-55182CRITICAL10
  • JavaScriptJavaScript
  • react
NoYesDec 03, 2025
CVE-2025-66401CRITICAL9.8
  • JavaScriptJavaScript
  • mcp-watch
NoNoDec 01, 2025
CVE-2025-66412HIGH8.5
  • JavaScriptJavaScript
  • @angular/compiler
NoYesDec 01, 2025
CVE-2025-66415MEDIUM6.9
  • JavaScriptJavaScript
  • @fastify/reply-from
NoYesDec 01, 2025
CVE-2025-66405MEDIUM6.9
  • JavaScriptJavaScript
  • @portkey-ai/gateway
NoYesDec 01, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management