
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2025-27146 affects matrix-appservice-irc, a Node.js IRC bridge for Matrix, in versions up to 3.0.3. The vulnerability was discovered and disclosed on February 25, 2025, and allows attackers to execute arbitrary IRC commands as their own puppeted user. The issue impacts the IRC bridge functionality of the software, potentially affecting organizations using Matrix for IRC communication (NVD CVE, GitHub Advisory).
The vulnerability is classified as a Command Injection (CWE-77) and Argument Injection (CWE-88) issue. It received a CVSS v3.1 base score of 4.3 (MEDIUM) from NIST and 2.7 (LOW) from GitHub, with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N. The vulnerability allows for command injection through insufficient validation of user input, enabling attackers to execute IRC commands as their puppeted user (NVD CVE).
The impact of this vulnerability is limited as attackers can only execute commands as their own IRC user. While this restricts the potential damage, it still allows for unauthorized command execution within the scope of the attacker's IRC user permissions (GitHub Advisory).
The vulnerability has been patched in matrix-appservice-irc version 3.0.4. Users are advised to upgrade to this version or later to address the security issue. No alternative workarounds have been provided (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."