Description
Element Android is an Android Matrix Client. Element Android version 1.4.3 through 1.6.10 is vulnerable to intent redirection, allowing a third-party malicious application to start any internal activity by passing some extra parameters. Possible impact includes making Element Android display an arbitrary web page, executing arbitrary JavaScript; bypassing PIN code protection; and account takeover by spawning a login screen to send credentials to an arbitrary home server. This issue is fixed in Element Android 1.6.12. There is no known workaround to mitigate the issue.
References (4)
Core 4
Core References
Patch, Vendor Advisory x_refsource_confirm
https://github.com/element-hq/element-android/security/advisories/GHSA-j6pr-fpc8-q9vm
Patch x_refsource_misc
https://github.com/element-hq/element-android/commit/53734255ec270b0814946350787393dfcaa2a5a9
Release Notes x_refsource_misc
https://element.io/blog/security-release-element-android-1-6-12
Technical Description x_refsource_misc
https://support.google.com/faqs/answer/9267555?hl=en
Scores
CVSS v3
8.4
EPSS
0.0004
EPSS Percentile
10.8%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-940
CWE-923
Status
published
Products (1)
element/element
1.4.3 - 1.6.12
Published
Feb 29, 2024
Tracked Since
Feb 18, 2026