CVE-2024-26132 – Element Android can be asked to share internal files.
https://notcve.org/view.php?id=CVE-2024-26132
Element Android is an Android Matrix Client. A third-party malicious application installed on the same phone can force Element Android, version 0.91.0 through 1.6.12, to share files stored under the `files` directory in the application's private data directory to an arbitrary room. The impact of the attack is reduced by the fact that the databases stored in this folder are encrypted. However, it contains some other potentially sensitive information, such as the FCM token. Forks of Element Android which have set `android:exported="false"` in the `AndroidManifest.xml` file for the `IncomingShareActivity` activity are not impacted. • https://element.io/blog/security-release-element-android-1-6-12 https://github.com/element-hq/element-android/commit/8f9695a9a8d944cb9b92568cbd76578c51d32e07 https://github.com/element-hq/element-android/security/advisories/GHSA-8wj9-cx7h-pvm4 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2024-26131 – Element Android Intent Redirection
https://notcve.org/view.php?id=CVE-2024-26131
Element Android is an Android Matrix Client. Element Android version 1.4.3 through 1.6.10 is vulnerable to intent redirection, allowing a third-party malicious application to start any internal activity by passing some extra parameters. Possible impact includes making Element Android display an arbitrary web page, executing arbitrary JavaScript; bypassing PIN code protection; and account takeover by spawning a login screen to send credentials to an arbitrary home server. This issue is fixed in Element Android 1.6.12. There is no known workaround to mitigate the issue. • https://element.io/blog/security-release-element-android-1-6-12 https://github.com/element-hq/element-android/commit/53734255ec270b0814946350787393dfcaa2a5a9 https://github.com/element-hq/element-android/security/advisories/GHSA-j6pr-fpc8-q9vm https://support.google.com/faqs/answer/9267555?hl=en • CWE-923: Improper Restriction of Communication Channel to Intended Endpoints CWE-940: Improper Verification of Source of a Communication Channel •
CVE-2024-24840 – WordPress Element Pack Elementor Addons plugin <= 5.4.11 - Broken Access Control on Duplicate Post vulnerability
https://notcve.org/view.php?id=CVE-2024-24840
Missing Authorization vulnerability in BdThemes Element Pack Elementor Addons.This issue affects Element Pack Elementor Addons: from n/a through 5.4.11. Vulnerabilidad de autorización faltante en los complementos de Elementor de BdThemes Element Pack. Este problema afecta a los complementos de Elementor de Element Pack: desde n/a hasta 5.4.11. The Element Pack Elementor Addons plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'bdt_duplicate_as_draft' function in versions up to, and including, 5.4.11. This makes it possible for authenticated attackers, with contributor-level access and above, to duplicate other user's posts and set their user as the author of the duplicated post. • https://patchstack.com/database/vulnerability/bdthemes-element-pack-lite/wordpress-element-pack-elementor-addons-plugin-5-4-11-broken-access-control-on-duplicate-post-vulnerability?_s_id=cve • CWE-862: Missing Authorization •
CVE-2023-50884 – LA-Studio Element Kit for Elementor <= 1.1.5 - Missing Authorization
https://notcve.org/view.php?id=CVE-2023-50884
The LA-Studio Element Kit for Elementor plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on a REST-API endpoint in versions up to, and including, 1.1.5. This makes it possible for unauthenticated attackers to update the plugin's settings. • CWE-862: Missing Authorization •
CVE-2022-41904 – Element iOS is vulnerable due to missing decoration for events decrypted with untrusted Megolm sessions
https://notcve.org/view.php?id=CVE-2022-41904
Element iOS is an iOS Matrix client provided by Element. It is based on MatrixSDK. Prior to version 1.9.7, events encrypted using Megolm for which trust could not be established did not get decorated accordingly (with warning shields). Therefore a malicious homeserver could inject messages into the room without the user being alerted that the messages were not sent by a verified group member, even if the user has previously verified all group members. This issue has been patched in Element iOS 1.9.7. • https://github.com/vector-im/element-ios/releases/tag/v1.9.7 https://github.com/vector-im/element-ios/security/advisories/GHSA-fm8m-99j7-323g • CWE-357: Insufficient UI Warning of Dangerous Operations •