This is an automated email from the ASF dual-hosted git repository. ilgrosso pushed a commit to branch 4_0_X in repository https://gitbox.apache.org/repos/asf/syncope.git
commit 41f7a7c22da3b54aa5d51d3f37f96597079a94b3 Author: Francesco Chicchiriccò <[email protected]> AuthorDate: Mon Feb 2 13:11:23 2026 +0100 Updating security page --- .../client/console/SyncopeConsoleApplication.java | 3 +- .../client/enduser/SyncopeWebApplication.java | 3 +- src/site/xdoc/security.xml | 82 ++++++++++++++++++++++ 3 files changed, 84 insertions(+), 4 deletions(-) diff --git a/client/idrepo/console/src/main/java/org/apache/syncope/client/console/SyncopeConsoleApplication.java b/client/idrepo/console/src/main/java/org/apache/syncope/client/console/SyncopeConsoleApplication.java index a92b9227f4..d58f35f5e8 100644 --- a/client/idrepo/console/src/main/java/org/apache/syncope/client/console/SyncopeConsoleApplication.java +++ b/client/idrepo/console/src/main/java/org/apache/syncope/client/console/SyncopeConsoleApplication.java @@ -89,8 +89,7 @@ public class SyncopeConsoleApplication extends SpringBootServletInitializer { final Cache<String, OffsetDateTime> loggedoutSessionIdCache, @Qualifier(SyncopeWebApplication.DESTROYED_SESSIONID_CACHE) final Cache<String, OffsetDateTime> destroyedSessionIdCache, - final DynamicMenuStringResourceLoader dynamicMenuStringResourceLoader - ) { + final DynamicMenuStringResourceLoader dynamicMenuStringResourceLoader) { return new SyncopeWebApplication( props, diff --git a/client/idrepo/enduser/src/main/java/org/apache/syncope/client/enduser/SyncopeWebApplication.java b/client/idrepo/enduser/src/main/java/org/apache/syncope/client/enduser/SyncopeWebApplication.java index 97dcf13ccb..9318e46496 100644 --- a/client/idrepo/enduser/src/main/java/org/apache/syncope/client/enduser/SyncopeWebApplication.java +++ b/client/idrepo/enduser/src/main/java/org/apache/syncope/client/enduser/SyncopeWebApplication.java @@ -101,8 +101,7 @@ public class SyncopeWebApplication extends WicketBootSecuredWebApplication imple final ClassPathScanImplementationLookup lookup, final ServiceOps serviceOps, final List<IResource> resources, - final DynamicMenuStringResourceLoader dynamicMenuStringResourceLoader - ) { + final DynamicMenuStringResourceLoader dynamicMenuStringResourceLoader) { this.resourceLoader = resourceLoader; this.props = props; diff --git a/src/site/xdoc/security.xml b/src/site/xdoc/security.xml index 7968e95dea..54d278a5e5 100644 --- a/src/site/xdoc/security.xml +++ b/src/site/xdoc/security.xml @@ -36,6 +36,88 @@ under the License. <p>If you want to report a vulnerability, please follow <a href="https://www.apache.org/security/">the procedure</a>.</p> + <subsection name="CVE-2026-23795: Apache Syncope: Console XXE on Keymaster parameters"> + <p>Improper Restriction of XML External Entity Reference vulnerability in Apache Syncope Console.</p> + <p>An administrator with adequate entitlements to create or edit Keymaster parameters via Console can construct malicious XML text to launch an XXE attack, thereby causing sensitive data leakage occurs.</p> + + <p> + <b>Severity</b> + </p> + <p>Important</p> + + <p> + <b>Affects</b> + </p> + <p> + <ul> + <li>4.0 through 4.0.3</li> + <li>3.0 through 3.0.15</li> + </ul> + </p> + + <p> + <b>Solution</b> + </p> + <p> + <ul> + <li>Users are recommended to upgrade to version 4.0.4 / 3.0.16 which fix this issue.</li> + </ul> + </p> + + <p> + <b>Fixed in</b> + </p> + <p> + <ul> + <li>Release 4.0.4</li> + <li>Release 3.0.16</li> + </ul> + </p> + + <p>Read the <a href="https://www.cve.org/CVERecord?id=CVE-2026-23795">full CVE advisory</a>.</p> + </subsection> + + <subsection name="CVE-2026-23794: Apache Syncope: Reflected XSS on Enduser Login"> + <p>Reflected XSS in Apache Syncope's Enduser Login page.</p> + <p>An attacker that tricks a legitimate user into clicking a malicious link and logging in to Syncope Enduser could steal that user's credentials.</p> + + <p> + <b>Severity</b> + </p> + <p>Important</p> + + <p> + <b>Affects</b> + </p> + <p> + <ul> + <li>4.0 through 4.0.3</li> + <li>3.0 through 3.0.15</li> + </ul> + </p> + + <p> + <b>Solution</b> + </p> + <p> + <ul> + <li>Users are recommended to upgrade to version 4.0.4 / 3.0.16 which fix this issue.</li> + </ul> + </p> + + <p> + <b>Fixed in</b> + </p> + <p> + <ul> + <li>Release 4.0.4</li> + <li>Release 3.0.16</li> + </ul> + </p> + + <p>Read the <a href="https://www.cve.org/CVERecord?id=CVE-2026-23794">full CVE advisory</a>.</p> + </subsection> + <subsection name="CVE-2025-65998: Apache Syncope: Default AES key used for internal password encryption"> <p>Apache Syncope can be configured to store the user password values in the internal database with AES encryption, though this is not the default option.</p>
