VYPR
Medium severity5.3OSV Advisory· Published Apr 3, 2025· Updated Apr 15, 2026

CVE-2025-31127

CVE-2025-31127

Description

Element X Android is a Matrix Android Client provided by element.io. In Element X Android versions between 0.4.16 and 25.03.3, the entity in control of the element.json well-known file is able, under certain conditions, to get access to the media encryption keys used for an Element Call call. This vulnerability is fixed in 25.03.4.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Element X Android vulnerability allows entity controlling well-known file to access Element Call media encryption keys.

The vulnerability stems from the feature that allows configuring the Element Call widget URL via the .well-known/element/element.json file, introduced in Element X Android versions 0.4.16 to 25.03.3 [1]. An attacker who controls this well-known file can potentially manipulate the widget URL to gain access to media encryption keys used during an Element Call [2].

To exploit this, the attacker must be able to control the well-known file for the user's homeserver domain. The attack requires no authentication and can be performed over the network when the app retrieves the well-known file during call setup [2]. The entity in control of the well-known file can intercept or redirect the call widget, leading to exposure of encryption keys.

The impact is a breach of confidentiality for Element Call communications, as the attacker could decrypt media streams [2]. The CVSS score of 5.3 (Medium) reflects limited confidentiality impact, but the advisory notes this as high severity due to the ease of exploitation under certain conditions [2].

Users are advised to update to Element X Android version 25.03.4 or later, which fixes the issue [2]. For deployments where the entire infrastructure is controlled by a single organization, the risk is reduced [2].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

1

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

2

News mentions

0

No linked articles in our index yet.