Bug 2424789 (CVE-2025-68667) - CVE-2025-68667 conduit: continuwuity Has an Unintended Proxy or Intermediary and Improper Input Validation
Summary: CVE-2025-68667 conduit: continuwuity Has an Unintended Proxy or Intermediary ...
Keywords:
Status: NEW
Alias: CVE-2025-68667
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
urgent
urgent
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2424853 2424854
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-12-23 23:01 UTC by OSIDB Bzimport
Modified: 2025-12-24 10:57 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-12-23 23:01:14 UTC
continuwuity is a Matrix homeserver written in Rust. Prior to version 0.5.0, this vulnerability allows a remote, unauthenticated attacker to force the target server to cryptographically sign arbitrary membership events. The flaw exists because the server fails to validate the origin of a signing request, provided the event's state_key is a valid user ID belonging to the target server. This issue has been patched in version 0.5.0. A workaround for this issue involves blocking access to the PUT /_matrix/federation/v2/invite/{roomId}/{eventId} endpoint using the reverse proxy.


Note You need to log in before you can comment on or make changes to this bug.