Apache Syncope offers the ability to extend / customize the base behavior on every deployment by allowing to provide custom implementations of a few Java interfaces; such implementations can be provided either as Java or Groovy classes, with the latter being particularly attractive as the machinery is set for runtime reload.
Such a feature has been available for a while, but recently it was discovered that a malicious administrator can inject Groovy code that can be executed remotely by a running Apache Syncope Core instance.
Users are recommended to upgrade to version 3.0.14 / 4.0.2, which fix this issue by forcing the Groovy code to run in a sandbox.
Metrics
Affected Vendors & Products
References
History
Mon, 20 Oct 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Mon, 20 Oct 2025 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Apache Syncope offers the ability to extend / customize the base behavior on every deployment by allowing to provide custom implementations of a few Java interfaces; such implementations can be provided either as Java or Groovy classes, with the latter being particularly attractive as the machinery is set for runtime reload. Such a feature has been available for a while, but recently it was discovered that a malicious administrator can inject Groovy code that can be executed remotely by a running Apache Syncope Core instance. Users are recommended to upgrade to version 3.0.14 / 4.0.2, which fix this issue by forcing the Groovy code to run in a sandbox. | |
Title | Apache Syncope: Remote Code Execution by delegated administrators | |
Weaknesses | CWE-653 | |
References |
|

Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-10-20T15:15:48.774Z
Reserved: 2025-08-19T06:32:04.510Z
Link: CVE-2025-57738

Updated: 2025-10-20T15:13:55.273Z

Status : Received
Published: 2025-10-20T15:15:33.553
Modified: 2025-10-20T16:15:39.223
Link: CVE-2025-57738

No data.

No data.