Matrix Media Repo (MMR) is a highly configurable multi-homeserver media repository for Matrix. MMR makes requests to other servers as part of normal operation, and these resource owners can return large amounts of JSON back to MMR for parsing. In parsing, MMR can consume large amounts of memory and exhaust available memory. This is fixed in MMR v1.3.8. Users are advised to upgrade. For users unable to upgrade; forward proxies can be configured to block requests to unsafe hosts. Alternatively, MMR processes can be configured with memory limits and auto-restart. Running multiple MMR processes concurrently can help ensure a restart does not overly impact users.
History

Wed, 20 Aug 2025 15:00:00 +0000

Type Values Removed Values Added
First Time appeared T2bot
T2bot matrix-media-repo
CPEs cpe:2.3:a:t2bot:matrix-media-repo:*:*:*:*:*:*:*:*
Vendors & Products T2bot
T2bot matrix-media-repo

Wed, 12 Feb 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 16 Jan 2025 19:30:00 +0000

Type Values Removed Values Added
Description Matrix Media Repo (MMR) is a highly configurable multi-homeserver media repository for Matrix. MMR makes requests to other servers as part of normal operation, and these resource owners can return large amounts of JSON back to MMR for parsing. In parsing, MMR can consume large amounts of memory and exhaust available memory. This is fixed in MMR v1.3.8. Users are advised to upgrade. For users unable to upgrade; forward proxies can be configured to block requests to unsafe hosts. Alternatively, MMR processes can be configured with memory limits and auto-restart. Running multiple MMR processes concurrently can help ensure a restart does not overly impact users.
Title Denial of service through memory exhaustion in Matrix Media Repo
Weaknesses CWE-789
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-01-16T19:12:25.853Z

Updated: 2025-02-12T20:31:21.849Z

Reserved: 2024-11-15T17:11:13.438Z

Link: CVE-2024-52791

cve-icon Vulnrichment

Updated: 2025-02-12T20:26:23.221Z

cve-icon NVD

Status : Analyzed

Published: 2025-01-16T20:15:32.667

Modified: 2025-08-20T14:49:35.020

Link: CVE-2024-52791

cve-icon Redhat

No data.