icon

We found results for “

CVE-2025-68667

Good to know:

icon
icon

Date: December 23, 2025

continuwuity is a Matrix homeserver written in Rust. Prior to version 0.5.0, this vulnerability allows a remote, unauthenticated attacker to force the target server to cryptographically sign arbitrary membership events. The flaw exists because the server fails to validate the origin of a signing request, provided the event's state_key is a valid user ID belonging to the target server. This issue has been patched in version 0.5.0. A workaround for this issue involves blocking access to the PUT /_matrix/federation/v2/invite/{roomId}/{eventId} endpoint using the reverse proxy.

Severity Score

Severity Score

Weakness Type (CWE)

Improper Input Validation

CWE-20

Unintended Proxy or Intermediary ('Confused Deputy')

CWE-441

Top Fix

icon

Upgrade Version

Upgrade to version https://github.com/continuwuity/continuwuity.git - v0.5.0;https://github.com/matrix-construct/tuwune.git - v1.4.8

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): NONE
Scope (S): CHANGED
Confidentiality (C): HIGH
Integrity (I): HIGH
Availability (A): HIGH

Do you need more information?

Contact Us