First published: Sat Aug 29 2020(Updated: )
jitsi-meet-electron (aka Jitsi Meet Electron) before 2.3.0 calls the Electron shell.openExternal function without verifying that the URL is for an http or https resource, in some circumstances.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Jitsi Meet | <2.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-25019 is high with a CVSS score of 7.5.
The affected software for CVE-2020-25019 is Jitsi Meet Electron version up to but exclusive of 2.3.0.
CVE-2020-25019 allows the execution of arbitrary commands if a user clicks on a malicious link, potentially leading to unauthorized access or further attacks.
Yes, the fix for CVE-2020-25019 is included in Jitsi Meet Electron version 2.3.0.
You can find more information about CVE-2020-25019 on the official GitHub repository and release page for Jitsi Meet Electron, as well as on a related security stack exchange question.