CVE-2025-57738

Apache Syncope offers the ability to extend / customize the base behavior on every deployment by allowing to provide custom implementations of a few Java interfaces; such implementations can be provided either as Java or Groovy classes, with the latter being particularly attractive as the machinery is set for runtime reload. Such a feature has been available for a while, but recently it was discovered that a malicious administrator can inject Groovy code that can be executed remotely by a running Apache Syncope Core instance. Users are recommended to upgrade to version 3.0.14 / 4.0.2, which fix this issue by forcing the Groovy code to run in a sandbox.
Configurations

No configuration.

History

20 Oct 2025, 16:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.2

20 Oct 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-10-20 15:15

Updated : 2025-10-21 19:31


NVD link : CVE-2025-57738

Mitre link : CVE-2025-57738

CVE.ORG link : CVE-2025-57738


JSON object : View

Products Affected

No product.

CWE
CWE-653

Improper Isolation or Compartmentalization