The Export Chat feature includes certain attacker-controlled elements in the generated document without sufficient escaping, leading to stored XSS.
Since the Export Chat feature generates a separate document, an attacker can only inject code run from the null origin, restricting the impact.
However, the attacker can still potentially use the XSS to leak message contents. A malicious homeserver is a potential attacker since the affected inputs are controllable server-side.
This was patched in matrix-react-sdk 3.76.0.
None, other than not using the Export Chat feature.
N/A
{
"severity": "MODERATE",
"github_reviewed_at": "2023-07-18T16:58:01Z",
"cwe_ids": [
"CWE-79",
"CWE-80"
],
"github_reviewed": true,
"nvd_published_at": "2023-07-18T17:15:11Z"
}