{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T06:45:29.707","vulnerabilities":[{"cve":{"id":"CVE-2024-26131","sourceIdentifier":"security-advisories@github.com","published":"2024-02-29T01:44:17.740","lastModified":"2025-02-14T17:25:08.840","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Element Android is an Android Matrix Client. Element Android version 1.4.3 through 1.6.10 is vulnerable to intent redirection, allowing a third-party malicious application to start any internal activity by passing some extra parameters. Possible impact includes making Element Android display an arbitrary web page, executing arbitrary JavaScript; bypassing PIN code protection; and account takeover by spawning a login screen to send credentials to an arbitrary home server. This issue is fixed in Element Android 1.6.12. There is no known workaround to mitigate the issue."},{"lang":"es","value":"Element Android es un cliente Matrix de Android. Element Android versión 1.4.3 a 1.6.10 es vulnerable a la redirección de intención, lo que permite que una aplicación maliciosa de terceros inicie cualquier actividad interna pasando algunos parámetros adicionales. El posible impacto incluye hacer que Element Android muestre una página web arbitraria, ejecutando JavaScript arbitrario; eludir la protección del código PIN; y toma de control de cuentas generando una pantalla de inicio de sesión para enviar credenciales a un servidor doméstico arbitrario. Este problema se solucionó en Element Android 1.6.12. No se conoce ningún workaround para mitigar el problema."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.4,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.5,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-923"},{"lang":"en","value":"CWE-940"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:element:element:*:*:*:*:*:android:*:*","versionStartIncluding":"1.4.3","versionEndExcluding":"1.6.12","matchCriteriaId":"AD8D6757-CCAD-4C76-B321-68892E7CE2A2"}]}]}],"references":[{"url":"https://element.io/blog/security-release-element-android-1-6-12","source":"security-advisories@github.com","tags":["Release Notes"]},{"url":"https://github.com/element-hq/element-android/commit/53734255ec270b0814946350787393dfcaa2a5a9","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/element-hq/element-android/security/advisories/GHSA-j6pr-fpc8-q9vm","source":"security-advisories@github.com","tags":["Patch","Vendor Advisory"]},{"url":"https://support.google.com/faqs/answer/9267555?hl=en","source":"security-advisories@github.com","tags":["Technical Description"]},{"url":"https://element.io/blog/security-release-element-android-1-6-12","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Release Notes"]},{"url":"https://github.com/element-hq/element-android/commit/53734255ec270b0814946350787393dfcaa2a5a9","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/element-hq/element-android/security/advisories/GHSA-j6pr-fpc8-q9vm","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://support.google.com/faqs/answer/9267555?hl=en","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Technical Description"]}]}}]}