{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-28T02:06:56.413","vulnerabilities":[{"cve":{"id":"CVE-2022-39254","sourceIdentifier":"security-advisories@github.com","published":"2022-09-29T15:15:10.513","lastModified":"2024-11-21T07:17:53.233","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"matrix-nio is a Python Matrix client library, designed according to sans I/O principles. Prior to version 0.20, when a users requests a room key from their devices, the software correctly remember the request. Once they receive a forwarded room key, they accept it without checking who the room key came from. This allows homeservers to try to insert room keys of questionable validity, potentially mounting an impersonation attack. Version 0.20 fixes the issue."},{"lang":"es","value":"matrix-nio es una librería cliente de Matrix en Python, diseñada según los principios de sans I/O. En versiones anteriores a 0.20, cuando los usuarios solicitaban una llave de habitación desde sus dispositivos, el software recordaba correctamente la petición. Una vez que reciben una llave de habitación reenviada, la aceptan sin comprobar de quién procede la llave de habitación. Esto permite que los servidores domésticos intenten introducir llaves de habitación de dudosa validez, montando potencialmente un ataque de suplantación de identidad. La versión 0.20 corrige el problema"}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N","baseScore":8.6,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":4.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-287"},{"lang":"en","value":"CWE-322"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:matrix-nio_project:matrix-nio:*:*:*:*:*:*:*:*","versionEndExcluding":"0.20","matchCriteriaId":"506DDAC5-7A26-4D1C-A74A-A49F6CD49F31"}]}]}],"references":[{"url":"https://github.com/poljar/matrix-nio/commit/b1cbf234a831daa160673defd596e6450e9c29f0","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/poljar/matrix-nio/security/advisories/GHSA-w4pr-4vjg-hffh","source":"security-advisories@github.com","tags":["Third Party Advisory"]},{"url":"https://github.com/poljar/matrix-nio/commit/b1cbf234a831daa160673defd596e6450e9c29f0","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/poljar/matrix-nio/security/advisories/GHSA-w4pr-4vjg-hffh","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}