This is an automated email from the ASF dual-hosted git repository.

ilgrosso pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/syncope.git

commit caa57de48783923c6d0ecf944e17de3b45b94b99
Author: Francesco Chicchiriccò <[email protected]>
AuthorDate: Mon Oct 20 16:40:08 2025 +0200

    Updating security page
---
 src/site/xdoc/security.xml | 43 +++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 43 insertions(+)

diff --git a/src/site/xdoc/security.xml b/src/site/xdoc/security.xml
index 536be0edab..d12c79c539 100644
--- a/src/site/xdoc/security.xml
+++ b/src/site/xdoc/security.xml
@@ -36,6 +36,49 @@ under the License.
 
       <p>If you want to report a vulnerability, please follow <a 
href="https://www.apache.org/security/";>the procedure</a>.</p>
 
+      <subsection name="CVE-2025-57738: Apache Syncope: Remote Code Execution 
by delegated administrators">
+        <p>Apache Syncope offers the ability to extend / customize the base 
behavior on every deployment by allowing to provide custom implementations of a 
few Java interfaces; such implementations can be provided either as Java or 
Groovy classes, with the latter being particularly attractive as the machinery 
is set for runtime reload.
+Such a feature has been available for a while, but recently it was discovered 
that a malicious administrator can inject Groovy code that can be executed 
remotely by a running Apache Syncope Core instance.
+Users are recommended to upgrade to version 3.0.14 / 4.0.2, which fix this 
issue by forcing the Groovy code to run in a sandbox.</p>
+
+        <p>
+          <b>Severity</b>
+        </p>
+        <p>Moderate</p>
+
+        <p>
+          <b>Affects</b>
+        </p>
+        <p>
+          <ul>
+            <li>4.0 through 4.0.1</li>
+            <li>3.0 through 3.0.13</li>
+            <li>2.1 through 2.1.14</li>
+          </ul>
+        </p>
+
+        <p>
+          <b>Solution</b>
+        </p>
+        <p>
+          <ul>
+            <li>Users are recommended to upgrade to version 4.0.2 / 3.0.14 
which fix this issue.</li>
+          </ul>
+        </p>
+
+        <p>
+          <b>Fixed in</b>
+        </p>
+        <p>
+          <ul>
+            <li>Release 4.0.2</li>
+            <li>Release 3.0.14</li>
+          </ul>
+        </p>
+
+        <p>Read the <a 
href="https://www.cve.org/CVERecord?id=CVE-2025-57738";>full CVE 
advisory</a>.</p>
+      </subsection>
+
       <subsection name="CVE-2024-45031: Apache Syncope: Stored XSS in Console 
and Enduser">
         <p>When editing objects in the Syncope Console, incomplete HTML tags 
could be used to bypass HTML sanitization. This made it possible to inject 
stored XSS payloads which would trigger for other users during ordinary usage 
of the application.<br/>
 XSS payloads could also be injected in Syncope Enduser when editing “Personal 
Information” or “User Requests”: such payloads would trigger for administrators 
in Syncope Console, thus enabling session hijacking.</p>

Reply via email to