We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-27599

Element X Android vulnerable to loading malicious web pages via received intent



Description

Element X Android is a Matrix Android Client provided by element.io. Prior to version 25.04.2, a crafted hyperlink on a webpage, or a locally installed malicious app, can force Element X up to version 25.04.1 to load a webpage with similar permissions to Element Call and automatically grant it temporary access to microphone and camera. This issue has been patched in version 25.04.2.

Reserved 2025-03-03 | Published 2025-04-18 | Updated 2025-04-18 | Assigner GitHub_M


MEDIUM: 6.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

Problem types

CWE-926: Improper Export of Android Application Components

CWE-20: Improper Input Validation

Product status

< 25.04.2
affected

References

github.com/...ndroid/security/advisories/GHSA-m5px-pwq3-4p5m

github.com/...ommit/dc058544d7e693c04298191c1aadd5b39c9be52e

github.com/...ent-hq/element-x-android/releases/tag/v25.04.2

cve.org (CVE-2025-27599)

nvd.nist.gov (CVE-2025-27599)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-27599

Support options

Helpdesk Chat, Email, Knowledgebase