First published: Tue Feb 25 2025(Updated: )
### Impact The matrix-appservice-irc bridge up to version 3.0.3 contains a vulnerability which can lead to arbitrary IRC command execution as the puppeted user. The attacker can only inject commands executed as their own IRC user. ### Patches The vulnerability has been patched in matrix-appservice-irc version 3.0.4. ### For more information If you have any questions or comments about this advisory, please email us at [security at matrix.org](mailto:security@matrix.org).
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
npm/matrix-appservice-irc | <3.0.4 | 3.0.4 |
Matrix-appservice-bridge | <3.0.4 | |
<3.0.4 |
https://github.com/matrix-org/matrix-appservice-irc/commit/74f02c8e11f16ed1b355700092c1aa9c036a11bd
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-27146 is rated as a high severity vulnerability due to its potential for arbitrary command execution.
To fix CVE-2025-27146, upgrade to matrix-appservice-irc version 3.0.4 or later.
An attacker can inject arbitrary IRC commands that are executed as their own IRC user.
Versions of matrix-appservice-irc up to 3.0.3 are affected by CVE-2025-27146.
There is no official workaround; the best course of action is to apply the patch by updating to version 3.0.4.