PT-2026-5720 · Unknown +3 · Continuwuity +3

Jadedblueeyes

·

Published

2026-02-02

·

Updated

2026-02-02

·

CVE-2026-24471

CVSS v4.0
9.3
VectorAV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:L/SI:L/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Name of the Vulnerable Software and Affected Versions Continuwuity versions prior to 0.5.1 Conduit versions prior to 0.10.11 Grapevine versions prior to 0aae932b Tuwunel versions prior to 1.4.9
Description A flaw exists that allows a malicious remote server to cause a local server to sign an arbitrary event upon user interaction. This occurs when a user account leaves a room, joins a room, or knocks on a room, potentially prompting the victim server to request assistance from a remote server. If the victim requests assistance from an attacker-controlled server, the attacker can provide an arbitrary event, which the victim server will then sign and return. The
/leave
endpoint is vulnerable to any event with a supported room version, requiring the origin and origin server ts to be set by the victim. The
/join
endpoint requires an additional victim-set content field in the format of a join membership. The
/knock
endpoint requires an additional victim-set content field in the format of a knock membership and a room version not between 1 and 6. This issue was exploited against the continuwuity.org homeserver.
Recommendations Update Continuwuity to version 0.5.1 or later. Update Conduit to version 0.10.11 or later. Update Grapevine to version 0aae932b or later. Update Tuwunel to version 1.4.9 or later.

Fix

Weakness Enumeration

Related Identifiers

CVE-2026-24471

Affected Products

Conduit
Continuwuity
Grapevine
Tuwunel