Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2025-32026 | First vendor Publication | 2025-04-08 |
Vendor | Cve | Last vendor Modification | 2025-04-08 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : | |||
---|---|---|---|
Cvss Base Score | N/A | Attack Range | N/A |
Cvss Impact Score | N/A | Attack Complexity | N/A |
Cvss Expoit Score | N/A | Authentication | N/A |
Calculate full CVSS 2.0 Vectors scores |
Detail
Element Web is a Matrix web client built using the Matrix React SDK. Element Web, starting from version 1.11.16 up to version 1.11.96, can be configured to load Element Call from an external URL. Under certain conditions, the external page is able to get access to the media encryption keys used for an Element Call call. Version 1.11.97 fixes the problem. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32026 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-497 | Exposure of System Data to an Unauthorized Control Sphere |
Sources (Detail)
Source | Url |
---|
Alert History
Date | Informations |
---|---|
2025-05-27 02:57:08 |
|