
CVE-2025-27599 – Element X Android vulnerable to loading malicious web pages via received intent
https://notcve.org/view.php?id=CVE-2025-27599
18 Apr 2025 — Element X Android is a Matrix Android Client provided by element.io. Prior to version 25.04.2, a crafted hyperlink on a webpage, or a locally installed malicious app, can force Element X up to version 25.04.1 to load a webpage with similar permissions to Element Call and automatically grant it temporary access to microphone and camera. This issue has been patched in version 25.04.2. Element X Android es un cliente Matrix para Android proporcionado por element.io. Antes de la versión 25.04.2, un hipervínculo... • https://github.com/element-hq/element-x-android/commit/dc058544d7e693c04298191c1aadd5b39c9be52e • CWE-20: Improper Input Validation CWE-926: Improper Export of Android Application Components •

CVE-2025-31127 – Element X Android allows the entity in control of the well-known file to break the confidentiality embedded Element Call
https://notcve.org/view.php?id=CVE-2025-31127
03 Apr 2025 — Element X Android is a Matrix Android Client provided by element.io. In Element X Android versions between 0.4.16 and 25.03.3, the entity in control of the element.json well-known file is able, under certain conditions, to get access to the media encryption keys used for an Element Call call. This vulnerability is fixed in 25.03.4. Element X Android es un cliente Matrix para Android proporcionado por element.io. En las versiones de Element X para Android entre la 0.4.16 y la 25.03.3, la entidad que controla... • https://github.com/element-hq/element-meta/issues/2441 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2025-27606 – Element Android PIN autologout bypass
https://notcve.org/view.php?id=CVE-2025-27606
14 Mar 2025 — Element Android is an Android Matrix Client provided by Element. Element Android up to version 1.6.32 can, under certain circumstances, fail to logout the user if they input the wrong PIN more than the configured amount of times. An attacker with physical access to a device can exploit this to guess the PIN. Version 1.6.34 solves the issue. • https://github.com/element-hq/element-android/commit/53bd78b05de375c6e6b0b5aa794a56b4ba95984c • CWE-488: Exposure of Data Element to Wrong Session •

CVE-2024-26132 – Element Android can be asked to share internal files.
https://notcve.org/view.php?id=CVE-2024-26132
20 Feb 2024 — Element Android is an Android Matrix Client. A third-party malicious application installed on the same phone can force Element Android, version 0.91.0 through 1.6.12, to share files stored under the `files` directory in the application's private data directory to an arbitrary room. The impact of the attack is reduced by the fact that the databases stored in this folder are encrypted. However, it contains some other potentially sensitive information, such as the FCM token. Forks of Element Android which have... • https://element.io/blog/security-release-element-android-1-6-12 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2024-26131 – Element Android Intent Redirection
https://notcve.org/view.php?id=CVE-2024-26131
20 Feb 2024 — Element Android is an Android Matrix Client. Element Android version 1.4.3 through 1.6.10 is vulnerable to intent redirection, allowing a third-party malicious application to start any internal activity by passing some extra parameters. Possible impact includes making Element Android display an arbitrary web page, executing arbitrary JavaScript; bypassing PIN code protection; and account takeover by spawning a login screen to send credentials to an arbitrary home server. This issue is fixed in Element Andro... • https://element.io/blog/security-release-element-android-1-6-12 • CWE-923: Improper Restriction of Communication Channel to Intended Endpoints CWE-940: Improper Verification of Source of a Communication Channel •