Skip to main content

CVE-2025-59047: CWE-682: Incorrect Calculation in matrix-org matrix-rust-sdk

Low
VulnerabilityCVE-2025-59047cvecve-2025-59047cwe-682
Published: Thu Sep 11 2025 (09/11/2025, 18:03:50 UTC)
Source: CVE Database V5
Vendor/Project: matrix-org
Product: matrix-rust-sdk

Description

matrix-sdk-base is the base component to build a Matrix client library. In matrix-sdk-base before 0.14.1, calling the `RoomMember::normalized_power_level()` method can cause a panic if a room member has a power level of `Int::Min`. The issue is fixed in matrix-sdk-base 0.14.1. The affected method isn’t used internally, so avoiding calling `RoomMember::normalized_power_level()` prevents the panic.

AI-Powered Analysis

AILast updated: 09/11/2025, 18:12:28 UTC

Technical Analysis

CVE-2025-59047 is a vulnerability identified in the matrix-sdk-base component of the matrix-rust-sdk, a foundational library used to build Matrix client applications. The issue arises in versions prior to 0.14.1 within the method RoomMember::normalized_power_level(). Specifically, if a room member's power level is set to Int::Min (the minimum integer value), invoking this method causes the program to panic, which is a runtime error leading to an abrupt termination of the process. This vulnerability is classified under CWE-682, indicating an incorrect calculation or logic error. The root cause is the failure to handle edge cases where the power level is at the minimum integer boundary, resulting in an unhandled panic. Notably, this method is not used internally by the SDK itself, so the vulnerability only manifests if external code calls this particular method. The issue was addressed and fixed in version 0.14.1 of matrix-sdk-base. There are no known exploits in the wild, and the CVSS 4.0 score is 2.7, reflecting a low severity. The vulnerability does not require authentication, user interaction, or privileges to exploit, but it only causes a denial of service via a panic rather than data compromise or code execution. The impact is limited to applications that directly call the vulnerable method with a crafted power level value. Since the matrix-rust-sdk is used to build Matrix clients, this could affect messaging applications relying on this SDK if they do not update to the patched version or avoid calling the vulnerable method.

Potential Impact

For European organizations, the impact of this vulnerability is generally low but context-dependent. Organizations using Matrix-based communication clients built on the affected versions of matrix-rust-sdk could experience application crashes or denial of service conditions if an attacker or malicious user can manipulate room member power levels to Int::Min and trigger the vulnerable method. This could disrupt internal or external communications temporarily, affecting operational continuity. However, since the vulnerability does not lead to data leakage, privilege escalation, or remote code execution, the confidentiality and integrity of communications remain intact. The risk is higher for organizations that have integrated custom Matrix clients or bots that call RoomMember::normalized_power_level() without validation. Given the low CVSS score and absence of known exploits, the immediate threat level is low, but organizations should still prioritize patching to avoid potential service disruptions, especially in sectors relying heavily on Matrix for secure messaging such as government, finance, and critical infrastructure in Europe.

Mitigation Recommendations

European organizations should take the following specific mitigation steps: 1) Identify all applications and services using matrix-rust-sdk versions prior to 0.14.1, particularly those that implement or call RoomMember::normalized_power_level(). 2) Upgrade all affected matrix-rust-sdk dependencies to version 0.14.1 or later, where the issue is fixed. 3) If immediate upgrading is not feasible, audit the codebase to ensure that RoomMember::normalized_power_level() is not called or that inputs are validated to prevent power levels set to Int::Min. 4) Implement runtime monitoring and logging to detect unexpected panics or crashes related to Matrix client operations. 5) Engage with vendors or open-source maintainers to confirm that patched versions are deployed in production environments. 6) Conduct testing in staging environments to verify that the patch or mitigations do not introduce regressions. These steps go beyond generic advice by focusing on dependency management, code auditing for specific method usage, and operational monitoring tailored to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-09-08T16:19:26.172Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c310fa2375b43386b94f8d

Added to database: 9/11/2025, 6:12:10 PM

Last enriched: 9/11/2025, 6:12:28 PM

Last updated: 9/11/2025, 7:07:37 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats