continuwuity is a Matrix homeserver written in Rust. Prior to version 0.5.0, this vulnerability allows a remote, unauthenticated attacker to force the target server to cryptographically sign arbitrary membership events. The flaw exists because the server fails to validate the origin of a signing request, provided the event's state_key is a valid user ID belonging to the target server. This issue has been patched in version 0.5.0. A workaround for this issue involves blocking access to the PUT /_matrix/federation/v2/invite/{roomId}/{eventId} endpoint using the reverse proxy.
History

Wed, 24 Dec 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 24 Dec 2025 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Continuwuity
Continuwuity continuwuity
Vendors & Products Continuwuity
Continuwuity continuwuity

Tue, 23 Dec 2025 23:00:00 +0000

Type Values Removed Values Added
Description continuwuity is a Matrix homeserver written in Rust. Prior to version 0.5.0, this vulnerability allows a remote, unauthenticated attacker to force the target server to cryptographically sign arbitrary membership events. The flaw exists because the server fails to validate the origin of a signing request, provided the event's state_key is a valid user ID belonging to the target server. This issue has been patched in version 0.5.0. A workaround for this issue involves blocking access to the PUT /_matrix/federation/v2/invite/{roomId}/{eventId} endpoint using the reverse proxy.
Title continuwuity Has an Unintended Proxy or Intermediary and Improper Input Validation
Weaknesses CWE-20
CWE-441
References
Metrics cvssV4_0

{'score': 9.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:L/SA:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-12-23T22:45:25.958Z

Updated: 2025-12-24T14:51:52.781Z

Reserved: 2025-12-22T23:37:00.930Z

Link: CVE-2025-68667

cve-icon Vulnrichment

Updated: 2025-12-24T14:51:49.382Z

cve-icon NVD

Status : Received

Published: 2025-12-23T23:15:45.280

Modified: 2025-12-23T23:15:45.280

Link: CVE-2025-68667

cve-icon Redhat

No data.