CVE-2025-59161: CWE-20: Improper Input Validation in element-hq element-web
Element Web is a Matrix web client built using the Matrix React SDK. Element Web and Element Desktop before version 1.11.112 have insufficient validation of room predecessor links, allowing a remote attacker to attempt to impermanently replace a room's entry in the room list with an unrelated attacker-supplied room. While the effect of this is temporary, it may still confuse users into acting on incorrect assumptions. The issue has been patched and users should upgrade to 1.11.112. A reload/refresh will fix the incorrect room list state, removing the attacker's room and restoring the original room.
AI Analysis
Technical Summary
CVE-2025-59161 is a vulnerability identified in Element Web, a Matrix protocol web client built using the Matrix React SDK, and also affecting Element Desktop versions prior to 1.11.112. The root cause is improper input validation (CWE-20) related to room predecessor links. Specifically, the application does not sufficiently validate these links, which allows a remote attacker to temporarily replace a legitimate room's entry in the user's room list with an attacker-controlled, unrelated room. This manipulation is impermanent and can be corrected by a user refreshing or reloading the client, which restores the original room list state. The vulnerability does not require any authentication or user interaction to be exploited and can be triggered remotely over the network. The CVSS 4.0 base score is 2.7, indicating a low severity primarily due to the temporary nature of the impact and the lack of direct compromise of confidentiality, integrity, or availability beyond user confusion. The vulnerability could lead to user confusion or misdirection, potentially causing users to act on incorrect assumptions about their communication environment. This could be exploited in social engineering or phishing scenarios within the Matrix ecosystem. The issue has been addressed in Element Web and Desktop version 1.11.112, and users are advised to upgrade to this version or later to mitigate the risk. Since the attack effect is temporary and resolved by a client reload, the impact is limited but still noteworthy in environments where trust and accurate room listings are critical.
Potential Impact
For European organizations using Element Web or Desktop clients prior to version 1.11.112, this vulnerability could cause temporary confusion among users by displaying attacker-supplied rooms in place of legitimate ones. While this does not directly compromise sensitive data or system integrity, it could facilitate social engineering attacks or misinformation campaigns within internal or external communications. Organizations relying on Matrix for secure messaging, collaboration, or incident response could see reduced trust in their communication channels during exploitation. The temporary nature of the attack means that availability and data integrity are not permanently affected, but operational disruptions or miscommunications could occur. In regulated sectors such as finance, healthcare, or government, even temporary misinformation could have compliance or reputational consequences. The low CVSS score reflects the limited technical impact, but the human factor risk remains relevant, especially in high-security environments.
Mitigation Recommendations
1. Immediate upgrade of all Element Web and Desktop clients to version 1.11.112 or later to ensure the patch is applied. 2. Implement user awareness training to recognize potential anomalies in room listings and encourage verification before acting on unexpected room entries. 3. Monitor Matrix client logs and network traffic for unusual room predecessor link activity or unexpected room list changes that could indicate exploitation attempts. 4. Deploy endpoint security solutions capable of detecting anomalous client behavior or unauthorized modifications to client state. 5. Encourage users to perform a manual refresh or reload of the client if suspicious room list behavior is observed, as this action restores the correct state. 6. For organizations with custom Matrix integrations, review and harden input validation logic related to room metadata to prevent similar issues. 7. Maintain an up-to-date inventory of Matrix clients in use across the organization to ensure timely patch management.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Norway, Denmark
CVE-2025-59161: CWE-20: Improper Input Validation in element-hq element-web
Description
Element Web is a Matrix web client built using the Matrix React SDK. Element Web and Element Desktop before version 1.11.112 have insufficient validation of room predecessor links, allowing a remote attacker to attempt to impermanently replace a room's entry in the room list with an unrelated attacker-supplied room. While the effect of this is temporary, it may still confuse users into acting on incorrect assumptions. The issue has been patched and users should upgrade to 1.11.112. A reload/refresh will fix the incorrect room list state, removing the attacker's room and restoring the original room.
AI-Powered Analysis
Technical Analysis
CVE-2025-59161 is a vulnerability identified in Element Web, a Matrix protocol web client built using the Matrix React SDK, and also affecting Element Desktop versions prior to 1.11.112. The root cause is improper input validation (CWE-20) related to room predecessor links. Specifically, the application does not sufficiently validate these links, which allows a remote attacker to temporarily replace a legitimate room's entry in the user's room list with an attacker-controlled, unrelated room. This manipulation is impermanent and can be corrected by a user refreshing or reloading the client, which restores the original room list state. The vulnerability does not require any authentication or user interaction to be exploited and can be triggered remotely over the network. The CVSS 4.0 base score is 2.7, indicating a low severity primarily due to the temporary nature of the impact and the lack of direct compromise of confidentiality, integrity, or availability beyond user confusion. The vulnerability could lead to user confusion or misdirection, potentially causing users to act on incorrect assumptions about their communication environment. This could be exploited in social engineering or phishing scenarios within the Matrix ecosystem. The issue has been addressed in Element Web and Desktop version 1.11.112, and users are advised to upgrade to this version or later to mitigate the risk. Since the attack effect is temporary and resolved by a client reload, the impact is limited but still noteworthy in environments where trust and accurate room listings are critical.
Potential Impact
For European organizations using Element Web or Desktop clients prior to version 1.11.112, this vulnerability could cause temporary confusion among users by displaying attacker-supplied rooms in place of legitimate ones. While this does not directly compromise sensitive data or system integrity, it could facilitate social engineering attacks or misinformation campaigns within internal or external communications. Organizations relying on Matrix for secure messaging, collaboration, or incident response could see reduced trust in their communication channels during exploitation. The temporary nature of the attack means that availability and data integrity are not permanently affected, but operational disruptions or miscommunications could occur. In regulated sectors such as finance, healthcare, or government, even temporary misinformation could have compliance or reputational consequences. The low CVSS score reflects the limited technical impact, but the human factor risk remains relevant, especially in high-security environments.
Mitigation Recommendations
1. Immediate upgrade of all Element Web and Desktop clients to version 1.11.112 or later to ensure the patch is applied. 2. Implement user awareness training to recognize potential anomalies in room listings and encourage verification before acting on unexpected room entries. 3. Monitor Matrix client logs and network traffic for unusual room predecessor link activity or unexpected room list changes that could indicate exploitation attempts. 4. Deploy endpoint security solutions capable of detecting anomalous client behavior or unauthorized modifications to client state. 5. Encourage users to perform a manual refresh or reload of the client if suspicious room list behavior is observed, as this action restores the correct state. 6. For organizations with custom Matrix integrations, review and harden input validation logic related to room metadata to prevent similar issues. 7. Maintain an up-to-date inventory of Matrix clients in use across the organization to ensure timely patch management.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-09-09T15:23:16.327Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68c995a8cb0fe83b58201ab4
Added to database: 9/16/2025, 4:51:52 PM
Last enriched: 9/16/2025, 4:54:40 PM
Last updated: 9/17/2025, 1:39:44 AM
Views: 9
Related Threats
CVE-2025-9242: CWE-787 Out-of-bounds Write in WatchGuard Fireware OS
CriticalCVE-2025-9971: CWE-306 Missing Authentication for Critical Function in Planet Technology ICG-2510WG-LTE (EU/US)
CriticalCVE-2025-9450: CWE-457 Use of Uninitialized Variable in Dassault Systèmes SOLIDWORKS eDrawings
HighCVE-2025-9449: CWE-416 Use After Free in Dassault Systèmes SOLIDWORKS eDrawings
HighCVE-2025-9447: CWE-125 Out-of-bounds Read in Dassault Systèmes SOLIDWORKS eDrawings
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.