CVE-2025-64754

N/A Unknown

📋 TL;DR

This vulnerability in Jitsi Meet allows attackers to hijack the OAuth authentication window for Microsoft accounts, potentially stealing login credentials or session tokens. It affects all Jitsi Meet instances using Microsoft OAuth authentication prior to version 2.0.10532. Users authenticating with Microsoft accounts are at risk.

💻 Affected Systems

Products:
  • Jitsi Meet
Versions: All versions prior to 2.0.10532
Operating Systems: All platforms running Jitsi Meet
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects instances configured to use Microsoft OAuth authentication. Other authentication methods are not vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal Microsoft account credentials, gain unauthorized access to user accounts, and potentially compromise associated services and data.

🟠

Likely Case

Attackers could hijack user sessions, impersonate legitimate users in Jitsi Meet conferences, and access sensitive meeting content.

🟢

If Mitigated

With proper network segmentation and monitoring, impact could be limited to isolated authentication failures and detected anomalous login attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires the attacker to trick users into interacting with a malicious authentication flow. The vulnerability is in the OAuth implementation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.0.10532

Vendor Advisory: https://github.com/jitsi/jitsi-meet/security/advisories/GHSA-5fx7-wgcr-fj78

Restart Required: Yes

Instructions:

1. Backup current Jitsi Meet configuration. 2. Update Jitsi Meet to version 2.0.10532 or later using your package manager. 3. Restart all Jitsi Meet services. 4. Verify the update was successful.

🔧 Temporary Workarounds

Disable Microsoft OAuth Authentication

all

Temporarily disable Microsoft OAuth authentication and use alternative authentication methods until patching is complete.

Modify Jitsi Meet authentication configuration to remove Microsoft OAuth settings

🧯 If You Can't Patch

  • Implement network segmentation to isolate Jitsi Meet instances from untrusted networks
  • Enable enhanced monitoring for authentication events and OAuth redirects

🔍 How to Verify

Check if Vulnerable:

Check Jitsi Meet version and verify if Microsoft OAuth authentication is enabled in configuration files.

Check Version:

dpkg -l | grep jitsi-meet (Debian/Ubuntu) or rpm -qa | grep jitsi-meet (RHEL/CentOS)

Verify Fix Applied:

Confirm Jitsi Meet version is 2.0.10532 or later and test Microsoft OAuth authentication functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusual OAuth redirect patterns
  • Multiple failed authentication attempts from same source
  • Authentication requests to unexpected domains

Network Indicators:

  • Suspicious redirects during OAuth flow
  • Authentication requests to non-Microsoft domains

SIEM Query:

source="jitsi-logs" AND (event="oauth_redirect" AND url NOT CONTAINS "login.microsoftonline.com")

🔗 References

📤 Share & Export