Apache Syncope offers the ability to extend / customize the base behavior on every deployment by allowing to provide custom implementations of a few Java interfaces; such implementations can be provided either as Java or Groovy classes, with the latter being particularly attractive as the machinery is set for runtime reload.
Such a feature has been available for a while, but recently it was discovered that a malicious administrator can inject Groovy code that can be executed remotely by a running Apache Syncope Core instance.
Users are recommended to upgrade to version 3.0.14 / 4.0.2, which fix this issue by forcing the Groovy code to run in a sandbox.
Metrics
Affected Vendors & Products
References
History
Tue, 21 Oct 2025 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apache
Apache syncope |
|
| Vendors & Products |
Apache
Apache syncope |
Mon, 20 Oct 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Mon, 20 Oct 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Apache Syncope offers the ability to extend / customize the base behavior on every deployment by allowing to provide custom implementations of a few Java interfaces; such implementations can be provided either as Java or Groovy classes, with the latter being particularly attractive as the machinery is set for runtime reload. Such a feature has been available for a while, but recently it was discovered that a malicious administrator can inject Groovy code that can be executed remotely by a running Apache Syncope Core instance. Users are recommended to upgrade to version 3.0.14 / 4.0.2, which fix this issue by forcing the Groovy code to run in a sandbox. | |
| Title | Apache Syncope: Remote Code Execution by delegated administrators | |
| Weaknesses | CWE-653 | |
| References |
|
Status: PUBLISHED
Assigner: apache
Published: 2025-10-20T14:43:39.985Z
Updated: 2025-10-20T15:15:48.774Z
Reserved: 2025-08-19T06:32:04.510Z
Link: CVE-2025-57738
Updated: 2025-10-20T15:13:55.273Z
Status : Awaiting Analysis
Published: 2025-10-20T15:15:33.553
Modified: 2025-10-21T19:31:25.450
Link: CVE-2025-57738
No data.