In elisp-mode.el in GNU Emacs before 30.1, a user who chooses to invoke elisp-completion-at-point (for code completion) on untrusted Emacs Lisp source code can trigger unsafe Lisp macro expansion that allows attackers to execute arbitrary code. (This unsafe expansion also occurs if a user chooses to enable on-the-fly diagnosis that byte compiles untrusted Emacs Lisp source code.)
Advisories
Source ID Title
Debian DLA Debian DLA DLA-4069-1 emacs security update
Debian DSA Debian DSA DSA-5871-1 emacs security update
EUVD EUVD EUVD-2024-52189 In elisp-mode.el in GNU Emacs before 30.1, a user who chooses to invoke elisp-completion-at-point (for code completion) on untrusted Emacs Lisp source code can trigger unsafe Lisp macro expansion that allows attackers to execute arbitrary code. (This unsafe expansion also occurs if a user chooses to enable on-the-fly diagnosis that byte compiles untrusted Emacs Lisp source code.)
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00098}

epss

{'score': 0.001}


Tue, 13 May 2025 06:30:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:rhel_eus:9.4

Mon, 12 May 2025 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Redhat
Redhat enterprise Linux
Redhat rhel Eus
CPEs cpe:/a:redhat:enterprise_linux:9
cpe:/a:redhat:rhel_eus:9.2
Vendors & Products Redhat
Redhat enterprise Linux
Redhat rhel Eus

Wed, 30 Apr 2025 16:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:gnu:emacs:*:*:*:*:*:*:*:*

Tue, 04 Mar 2025 22:45:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Sat, 01 Mar 2025 05:30:00 +0000

Type Values Removed Values Added
Description In elisp-mode.el in GNU Emacs through 30.0.92, a user who chooses to invoke elisp-completion-at-point (for code completion) on untrusted Emacs Lisp source code can trigger unsafe Lisp macro expansion that allows attackers to execute arbitrary code. (This unsafe expansion also occurs if a user chooses to enable on-the-fly diagnosis that byte compiles untrusted Emacs Lisp source code.) In elisp-mode.el in GNU Emacs before 30.1, a user who chooses to invoke elisp-completion-at-point (for code completion) on untrusted Emacs Lisp source code can trigger unsafe Lisp macro expansion that allows attackers to execute arbitrary code. (This unsafe expansion also occurs if a user chooses to enable on-the-fly diagnosis that byte compiles untrusted Emacs Lisp source code.)
References

Mon, 02 Dec 2024 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Gnu
Gnu emacs
CPEs cpe:2.3:a:gnu:emacs:-:*:*:*:*:*:*:*
Vendors & Products Gnu
Gnu emacs
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}

cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Fri, 29 Nov 2024 02:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}

threat_severity

Important

cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

threat_severity

Moderate


Thu, 28 Nov 2024 01:45:00 +0000

Type Values Removed Values Added
Title emacs: arbitrary code execution via Lisp macro expansion
Weaknesses CWE-94
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}

threat_severity

Important


Wed, 27 Nov 2024 15:45:00 +0000

Type Values Removed Values Added
References

Wed, 27 Nov 2024 15:00:00 +0000

Type Values Removed Values Added
Description In elisp-mode.el in GNU Emacs through 30.0.92, a user who chooses to invoke elisp-completion-at-point (for code completion) on untrusted Emacs Lisp source code can trigger unsafe Lisp macro expansion that allows attackers to execute arbitrary code. (This unsafe expansion also occurs if a user chooses to enable on-the-fly diagnosis that byte compiles untrusted Emacs Lisp source code.)
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-03-13T19:25:55.594Z

Reserved: 2024-11-25T00:00:00.000Z

Link: CVE-2024-53920

cve-icon Vulnrichment

Updated: 2024-12-02T16:57:47.483Z

cve-icon NVD

Status : Analyzed

Published: 2024-11-27T15:15:26.837

Modified: 2025-04-30T16:21:59.130

Link: CVE-2024-53920

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-11-27T00:00:00Z

Links: CVE-2024-53920 - Bugzilla

cve-icon OpenCVE Enrichment

No data.