First published: Tue Mar 04 2025(Updated: )
### Impact The Pinecone Simulator (pineconesim) included in Pinecone up to commit https://github.com/matrix-org/pinecone/commit/ea4c33717fd74ef7d6f49490625a0fa10e3f5bbc is vulnerable to stored cross-site scripting. The payload storage is not permanent and will be wiped when restarting pineconsim. ### Patches Commit https://github.com/matrix-org/pinecone/commit/218b2801995b174085cb1c8fafe2d3aa661f85bd contains the fixes. ### Workarounds N/A ### For more information If you have any questions or comments about this advisory, please email us at [security at matrix.org](mailto:security@matrix.org).
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pinecone Simulator | <=ea4c337 | |
go/github.com/matrix-org/pinecone | <=0.11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-27155 is classified as a medium severity vulnerability due to its potential impact on user data security.
To fix CVE-2025-27155, upgrade to the Pinecone Simulator version beyond commit ea4c337 where the vulnerability has been addressed.
CVE-2025-27155 involves a stored cross-site scripting vulnerability in the Pinecone Simulator.
CVE-2025-27155 is only present in Pinecone Simulator versions up to and including commit ea4c337.
Users of the Pinecone Simulator up to version ea4c337 are susceptible to CVE-2025-27155.