CVE-2023-38691
JavaScript vulnerability analysis and mitigation

Overview

CVE-2023-38691 affects matrix-appservice-bridge, a library that provides an API for setting up bridges. The vulnerability was discovered in versions 4.0.0 through 9.0.0, with patches released in versions 8.1.2 and 9.0.1. The issue involves improper authentication (CWE-287) where a malicious Matrix server can exploit the OpenID exchange process to impersonate users when using the provisioning API (Matrix Advisory).

Technical details

The vulnerability stems from the library's failure to verify the servername part of the 'sub' parameter during OpenID token exchange. The 'sub' parameter contains the user's claimed MXID (Matrix ID), but the library does not validate whether the servername matches the one being communicated with. This oversight allows attackers to manipulate the authentication process. The vulnerability has been assigned a CVSS v3.1 base score of 5.0 (Medium) with vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N (Matrix Advisory, NVD).

Impact

The vulnerability enables a malicious actor to impersonate other users within the provisioning API context. An attacker could set up a server on any domain and respond with a 'sub' parameter corresponding to the user they want to impersonate, subsequently using the resulting token to perform unauthorized provisioning requests (Matrix Advisory).

Mitigation and workarounds

As a primary mitigation, users should upgrade to the patched versions: either version 8.1.2 or version 9.0.1 or later. For those unable to update immediately, the recommended workaround is to disable the provisioning API entirely. It's worth noting that if a bridge does not use the provisioning API, it is not vulnerable to this exploit (Matrix Advisory).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-67731HIGH8.7
  • JavaScriptJavaScript
  • servify-express
NoYesDec 12, 2025
CVE-2025-67718HIGH8.7
  • JavaScriptJavaScript
  • formio
NoYesDec 11, 2025
CVE-2025-8083HIGH8.6
  • JavaScriptJavaScript
  • vuetify
NoYesDec 12, 2025
CVE-2025-67750HIGH8.4
  • JavaScriptJavaScript
  • lightning-flow-scanner
NoYesDec 12, 2025
CVE-2025-8082MEDIUM6.3
  • JavaScriptJavaScript
  • vuetify
NoYesDec 12, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management