CVE-2025-32026: Element Web could load a malicious instance of Element Call leaking media encryption keys

3.8 CVSS

Description

Element Web is a Matrix web client built using the Matrix React SDK. Element Web, starting from version 1.11.16 up to version 1.11.96, can be configured to load Element Call from an external URL. Under certain conditions, the external page is able to get access to the media encryption keys used for an Element Call call. Version 1.11.97 fixes the problem.

Classification

CVE ID: CVE-2025-32026

CVSS Base Severity: LOW

CVSS Base Score: 3.8

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N

Problem Types

CWE-497: Exposure of Sensitive System Information to an Unauthorized Control Sphere

Affected Products

Vendor: element-hq

Product: element-web

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.02% (probability of being exploited)

EPSS Percentile: 3.42% (scored less or equal to compared to others)

EPSS Date: 2025-04-18 (when was this score calculated)

References

https://nvd.nist.gov/vuln/detail/CVE-2025-32026
https://github.com/element-hq/element-web/security/advisories/GHSA-69q3-jg79-cg79

Timeline