{"api_version":"1","generated_at":"2026-04-23T04:11:27+00:00","cve":"CVE-2022-39236","urls":{"html":"https://cve.report/CVE-2022-39236","api":"https://cve.report/api/cve/CVE-2022-39236.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-39236","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-39236"},"summary":{"title":"CVE-2022-39236","description":"Matrix Javascript SDK is the Matrix Client-Server SDK for JavaScript. Starting with version 17.1.0-rc.1, improperly formed beacon events can disrupt or impede the matrix-js-sdk from functioning properly, potentially impacting the consumer's ability to process data safely. Note that the matrix-js-sdk can appear to be operating normally but be excluding or corrupting runtime data presented to the consumer. This is patched in matrix-js-sdk v19.7.0. Redacting applicable events, waiting for the sync processor to store data, and restarting the client are possible workarounds. Alternatively, redacting the applicable events and clearing all storage will fix the further perceived issues. Downgrading to an unaffected version, noting that such a version may be subject to other vulnerabilities, will additionally resolve the issue.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2022-09-28 17:15:00","updated_at":"2022-12-08 03:15:00"},"problem_types":["NVD-CWE-noinfo"],"metrics":[],"references":[{"url":"https://security.gentoo.org/glsa/202210-35","name":"GLSA-202210-35","refsource":"GENTOO","tags":[],"title":"Mozilla Thunderbird: Multiple Vulnerabilities (GLSA 202210-35) — Gentoo security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-hvv8-5v86-r45x","name":"https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-hvv8-5v86-r45x","refsource":"CONFIRM","tags":[],"title":"Improper beacon events can cause availability issues · Advisory · matrix-org/matrix-js-sdk · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/matrix-org/matrix-spec-proposals/pull/3488","name":"https://github.com/matrix-org/matrix-spec-proposals/pull/3488","refsource":"MISC","tags":[],"title":"MSC3488: Extending events with location data by ara4n · Pull Request #3488 · matrix-org/matrix-spec-proposals · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/matrix-org/matrix-js-sdk/releases/tag/v19.7.0","name":"https://github.com/matrix-org/matrix-js-sdk/releases/tag/v19.7.0","refsource":"MISC","tags":[],"title":"Release v19.7.0 · matrix-org/matrix-js-sdk · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/matrix-org/matrix-js-sdk/commit/a587d7c36026fe1fcf93dfff63588abee359be76","name":"https://github.com/matrix-org/matrix-js-sdk/commit/a587d7c36026fe1fcf93dfff63588abee359be76","refsource":"MISC","tags":[],"title":"Resolve multiple CVEs · matrix-org/matrix-js-sdk@a587d7c · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-39236","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-39236","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"39236","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"matrix","cpe5":"javascript_sdk","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"node.js","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"39236","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"matrix","cpe5":"javascript_sdk","cpe6":"17.1.0","cpe7":"rc1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"node.js","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-39236","qid":"160177","title":"Oracle Enterprise Linux Security Update for thunderbird (ELSA-2022-7184)"},{"cve":"CVE-2022-39236","qid":"160181","title":"Oracle Enterprise Linux Security Update for thunderbird (ELSA-2022-7178)"},{"cve":"CVE-2022-39236","qid":"160184","title":"Oracle Enterprise Linux Security Update for thunderbird (ELSA-2022-7190)"},{"cve":"CVE-2022-39236","qid":"199024","title":"Ubuntu Security Notification for Thunderbird Vulnerabilities (USN-5724-1)"},{"cve":"CVE-2022-39236","qid":"240784","title":"Red Hat Update for thunderbird (RHSA-2022:7184)"},{"cve":"CVE-2022-39236","qid":"240786","title":"Red Hat Update for thunderbird (RHSA-2022:7190)"},{"cve":"CVE-2022-39236","qid":"240787","title":"Red Hat Update for thunderbird (RHSA-2022:7178)"},{"cve":"CVE-2022-39236","qid":"240791","title":"Red Hat Update for thunderbird (RHSA-2022:7182)"},{"cve":"CVE-2022-39236","qid":"240792","title":"Red Hat Update for thunderbird (RHSA-2022:7181)"},{"cve":"CVE-2022-39236","qid":"354131","title":"Amazon Linux Security Advisory for thunderbird : ALAS2-2022-1900"},{"cve":"CVE-2022-39236","qid":"377612","title":"Mozilla Thunderbird Multiple Vulnerabilities (MFSA2022-43)"},{"cve":"CVE-2022-39236","qid":"502515","title":"Alpine Linux Security Update for riot-web"},{"cve":"CVE-2022-39236","qid":"503177","title":"Alpine Linux Security Update for element-web"},{"cve":"CVE-2022-39236","qid":"506037","title":"Alpine Linux Security Update for element-web"},{"cve":"CVE-2022-39236","qid":"690947","title":"Free Berkeley Software Distribution (FreeBSD) Security Update for matrix clients (cb902a77-3f43-11ed-9402-901b0e9408dc)"},{"cve":"CVE-2022-39236","qid":"710676","title":"Gentoo Linux Mozilla Thunderbird Multiple Vulnerabilities (GLSA 202210-35)"},{"cve":"CVE-2022-39236","qid":"753237","title":"SUSE Enterprise Linux Security Update for MozillaThunderbird (SUSE-SU-2022:3800-1)"},{"cve":"CVE-2022-39236","qid":"940708","title":"AlmaLinux Security Update for thunderbird (ALSA-2022:7190)"},{"cve":"CVE-2022-39236","qid":"940711","title":"AlmaLinux Security Update for thunderbird (ALSA-2022:7178)"},{"cve":"CVE-2022-39236","qid":"960256","title":"Rocky Linux Security Update for thunderbird (RLSA-2022:7190)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security-advisories@github.com","ID":"CVE-2022-39236","STATE":"PUBLIC","TITLE":"Matrix Javascript SDK improper beacon events can cause availability issues"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"matrix-js-sdk","version":{"version_data":[{"version_value":">= 17.1.0-rc.1, < 19.7.0"}]}}]},"vendor_name":"matrix-org"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Matrix Javascript SDK is the Matrix Client-Server SDK for JavaScript. Starting with version 17.1.0-rc.1, improperly formed beacon events can disrupt or impede the matrix-js-sdk from functioning properly, potentially impacting the consumer's ability to process data safely. Note that the matrix-js-sdk can appear to be operating normally but be excluding or corrupting runtime data presented to the consumer. This is patched in matrix-js-sdk v19.7.0. Redacting applicable events, waiting for the sync processor to store data, and restarting the client are possible workarounds. Alternatively, redacting the applicable events and clearing all storage will fix the further perceived issues. Downgrading to an unaffected version, noting that such a version may be subject to other vulnerabilities, will additionally resolve the issue."}]},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":4.3,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-20: Improper Input Validation"}]}]},"references":{"reference_data":[{"name":"https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-hvv8-5v86-r45x","refsource":"CONFIRM","url":"https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-hvv8-5v86-r45x"},{"name":"https://github.com/matrix-org/matrix-spec-proposals/pull/3488","refsource":"MISC","url":"https://github.com/matrix-org/matrix-spec-proposals/pull/3488"},{"name":"https://github.com/matrix-org/matrix-js-sdk/commit/a587d7c36026fe1fcf93dfff63588abee359be76","refsource":"MISC","url":"https://github.com/matrix-org/matrix-js-sdk/commit/a587d7c36026fe1fcf93dfff63588abee359be76"},{"name":"https://github.com/matrix-org/matrix-js-sdk/releases/tag/v19.7.0","refsource":"MISC","url":"https://github.com/matrix-org/matrix-js-sdk/releases/tag/v19.7.0"},{"refsource":"GENTOO","name":"GLSA-202210-35","url":"https://security.gentoo.org/glsa/202210-35"}]},"source":{"advisory":"GHSA-hvv8-5v86-r45x","discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2022-09-28 17:15:00","lastModifiedDate":"2022-12-08 03:15:00","problem_types":["NVD-CWE-noinfo"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW","baseScore":5.3,"baseSeverity":"MEDIUM"},"exploitabilityScore":3.9,"impactScore":1.4}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:matrix:javascript_sdk:*:*:*:*:*:node.js:*:*","versionStartIncluding":"17.1.0","versionEndExcluding":"19.7.0","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:matrix:javascript_sdk:17.1.0:rc1:*:*:*:node.js:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}