CVE-2023-38690
JavaScript vulnerability analysis and mitigation

Overview

The CVE-2023-38690 vulnerability affects matrix-appservice-irc, a Node.js IRC bridge for Matrix, prior to version 1.0.1. The vulnerability was discovered and reported by Val Lorentz and was disclosed on August 4, 2023. This security flaw allows attackers to craft commands with newlines that would not be properly parsed, enabling the execution of arbitrary IRC commands through the bridge bot (GitHub Advisory).

Technical details

The vulnerability is classified as a command injection vulnerability (CWE-77) and improper input validation (CWE-20). It received a CVSS v3.1 base score of 9.8 CRITICAL from NIST (Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), while GitHub assessed it as MEDIUM with a score of 5.8 (Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N). The vulnerability specifically involves the improper parsing of newlines in commands, which could be exploited by passing a string of commands as a channel name (NVD).

Impact

The vulnerability allows attackers to execute arbitrary IRC commands through the bridge bot. This could potentially lead to unauthorized command execution and compromise the integrity of the IRC bridge operations. The severity of the impact is reflected in the high CVSS scores assigned by both NIST and GitHub (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in version 1.0.1 of matrix-appservice-irc, released on July 31, 2023. While there are no robust workarounds, users can temporarily disable dynamic channels in the configuration to prevent the most common execution method. However, it is strongly recommended to upgrade to version 1.0.1 or later for complete protection (GitHub Release, GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22787HIGH8.7
  • JavaScriptJavaScript
  • html2pdf.js
NoYesJan 14, 2026
CVE-2026-22820MEDIUM6.3
  • JavaScriptJavaScript
  • outray
NoYesJan 14, 2026
CVE-2026-22819MEDIUM5.9
  • JavaScriptJavaScript
  • outray
NoYesJan 14, 2026
CVE-2026-22036LOW3.7
  • JavaScriptJavaScript
  • node-undici
NoYesJan 14, 2026
GHSA-73rr-hh4g-fpgxLOWN/A
  • JavaScriptJavaScript
  • diff
NoYesJan 14, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management