Severity: moderate 

Affected versions:

- Apache Syncope 2.1 through 2.1.14
- Apache Syncope 3.0 through 3.0.13
- Apache Syncope 4.0 through 4.0.1

Description:

Apache Syncope offers the ability to extend / customize the base behavior on 
every deployment by allowing to provide custom implementations of a few Java 
interfaces; such implementations can be provided either as Java or Groovy 
classes, with the latter being particularly attractive as the machinery is set 
for runtime reload.
Such a feature has been available for a while, but recently it was discovered 
that a malicious administrator can inject Groovy code that can be executed 
remotely by a running Apache Syncope Core instance.
Users are recommended to upgrade to version 3.0.14 / 4.0.2, which fix this 
issue by forcing the Groovy code to run in a sandbox.

Credit:

Mike Cole (Mantel Group) (finder)

References:

https://syncope.apache.org/
https://www.cve.org/CVERecord?id=CVE-2025-57738

Reply via email to