CVE-2025-62425

8.3 HIGH

📋 TL;DR

A logic flaw in Matrix Authentication Service (MAS) versions 0.20.0 through 1.4.0 allows authenticated attackers to perform sensitive account operations without entering the current password. This includes password changes, email modifications, and account deactivation. Only instances with the local password database feature enabled are affected.

💻 Affected Systems

Products:
  • matrix-authentication-service
Versions: 0.20.0 through 1.4.0
Operating Systems: All
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when local password database feature is enabled (passwords section in config).

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete account takeover through password change, followed by account deactivation to prevent legitimate user access.

🟠

Likely Case

Unauthorized password change leading to account compromise and potential data exfiltration.

🟢

If Mitigated

Limited impact if strong session management and monitoring are in place to detect unusual account modifications.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated session access; exploitation is straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.4.1

Vendor Advisory: https://github.com/element-hq/matrix-authentication-service/security/advisories/GHSA-6wfp-jq3r-j9xh

Restart Required: Yes

Instructions:

1. Update matrix-authentication-service to version 1.4.1 or later. 2. Restart the MAS service. 3. Verify the patch is applied.

🔧 Temporary Workarounds

Disable local password database

all

Temporarily disable the vulnerable feature until patching is possible.

Edit MAS configuration file and remove or comment out the 'passwords' section.

🧯 If You Can't Patch

  • Implement strict session timeout and re-authentication policies for sensitive operations.
  • Enable detailed logging for all account modification events and monitor for anomalies.

🔍 How to Verify

Check if Vulnerable:

Check MAS version and configuration: if version is between 0.20.0 and 1.4.0 inclusive AND passwords section is enabled in config.

Check Version:

Run the MAS service with --version flag or check package manager.

Verify Fix Applied:

Confirm MAS version is 1.4.1 or later and restart service.

📡 Detection & Monitoring

Log Indicators:

  • Multiple password change attempts from same session
  • Account deactivation without password verification logs
  • Email modification events without re-authentication

Network Indicators:

  • Unusual pattern of account management API calls from single IP/session

SIEM Query:

source="mas.log" AND (event="password_change" OR event="account_deactivate" OR event="email_modify") AND NOT auth_method="password_verify"

🔗 References

📤 Share & Export