CVE-2024-42366

Source
https://cve.org/CVERecord?id=CVE-2024-42366
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-42366.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-42366
Aliases
  • GHSA-j98g-mgjm-wqph
Published
2024-08-08T16:51:07.016Z
Modified
2025-12-01T09:05:33.791176Z
Severity
  • 9.0 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H CVSS Calculator
Summary
VR Overlay RCE
Details

VRCX is an assistant/companion application for VRChat. In versions prior to 2024.03.23, a CefSharp browser with over-permission and cross-site scripting via overlay notification can be combined to result in remote command execution. These vulnerabilities are patched in VRCX 2023.12.24. In addition to the patch, VRCX maintainers worked with the VRC team and blocked the older version of VRCX on the VRC's API side. Users who use the older version of VRCX must update their installation to continue using VRCX.

Database specific
{
    "cwe_ids": [
        "CWE-269",
        "CWE-79"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/42xxx/CVE-2024-42366.json"
}
References

Affected packages

Git / github.com/vrcx-team/vrcx

Affected ranges

Type
GIT
Repo
https://github.com/vrcx-team/vrcx
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v2019.*

v2019.08.17
v2019.08.17.1
v2019.08.20
v2019.08.21
v2019.09.04
v2019.09.23
v2019.09.24
v2019.09.26
v2019.10.31
v2019.10.31.1
v2019.11.18

v2020.*

v2020.01.26
v2020.02.01
v2020.03.21
v2020.04.07
v2020.07.12
v2020.07.13
v2020.10.25
v2020.12.13

v2021.*

v2021.01.09
v2021.01.30
v2021.01.30.1
v2021.03.08
v2021.04.04
v2021.05.07
v2021.05.26
v2021.07.08
v2021.08.15
v2021.10.02
v2021.11.04
v2021.12.16

v2022.*

v2022.02.02
v2022.03.12
v2022.03.31
v2022.05.05
v2022.07.13
v2022.07.30
v2022.08.16
v2022.09.09
v2022.10.05
v2022.11.04
v2022.12.08
v2022.12.30

v2023.*

v2023.02.18
v2023.05.01
v2023.06.15
v2023.06.30
v2023.07.30
v2023.09.18
v2023.11.06
v2023.12.24

v2024.*

v2024.03.17

Database specific

source

"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-42366.json"