
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2025-49090 is a high-severity vulnerability in the Matrix protocol's state resolution mechanism discovered in 2025. The vulnerability affects Matrix servers participating in federated networks with untrusted servers. The issue was initially pre-disclosed on July 16, 2025, with patches released on August 11, 2025, and full details disclosed on August 14, 2025 (Matrix Blog).
The vulnerability is related to deficiencies in State Resolution 2.0, which could allow state resets in Matrix rooms. The issue involves how the protocol handles concurrent state changes and permission modifications, potentially leading to unexpected rollbacks of room state. The vulnerability received a CVSS v3.1 Base Score of 7.8 (HIGH) with vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (NVD).
The vulnerability's impact is rated as 'high' rather than 'critical' as it does not result in data compromise or exposure. The primary risk involves a malicious homeserver operator potentially corrupting chatroom state by resetting it to a prior value, such as reverting access control or room membership to an earlier configuration. This could affect room permissions and membership states but does not expose conversation history or additional data (Matrix Blog).
The vulnerability was addressed through the introduction of room version 12, which implements several security improvements including State Resolution v2.1. Server administrators are advised to upgrade their server software immediately if they are operating rooms with users participating from untrusted servers. Room administrators should upgrade their rooms to version 12 to guard against these attacks. The fix has been implemented across multiple Matrix server implementations including Conduit, Continuwuity, ejabberd, Dendrite, Rocket.chat, Synapse, Synapse Pro, and Tuwunel (Matrix Blog).
The Matrix community has responded to the security release with coordinated efforts across multiple implementation teams. The Matrix Foundation took an unusual approach by handling these changes under embargo due to their security-sensitive nature, working with the backend team at Element, the Matrix.org Security Team, the Spec Core Team, and independent security researchers. The community has acknowledged the necessity of the embargo while expressing appreciation for the transparent disclosure process (Matrix Blog).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."