Apache Syncope offers the ability to extend / customize the base behavior on every deployment by allowing to provide custom implementations of a few Java interfaces; such implementations can be provided either as Java or Groovy classes, with the latter being particularly attractive as the machinery is set for runtime reload.
Such a feature has been available for a while, but recently it was discovered that a malicious administrator can inject Groovy code that can be executed remotely by a running Apache Syncope Core instance.
Users are recommended to upgrade to version 3.0.14 / 4.0.2, which fix this issue by forcing the Groovy code to run in a sandbox.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-825g-mm5v-ggq4 Apache Syncope allows malicious administrators to inject Groovy code
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 20 Oct 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 20 Oct 2025 15:00:00 +0000

Type Values Removed Values Added
Description Apache Syncope offers the ability to extend / customize the base behavior on every deployment by allowing to provide custom implementations of a few Java interfaces; such implementations can be provided either as Java or Groovy classes, with the latter being particularly attractive as the machinery is set for runtime reload. Such a feature has been available for a while, but recently it was discovered that a malicious administrator can inject Groovy code that can be executed remotely by a running Apache Syncope Core instance. Users are recommended to upgrade to version 3.0.14 / 4.0.2, which fix this issue by forcing the Groovy code to run in a sandbox.
Title Apache Syncope: Remote Code Execution by delegated administrators
Weaknesses CWE-653
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2025-10-20T15:15:48.774Z

Reserved: 2025-08-19T06:32:04.510Z

Link: CVE-2025-57738

cve-icon Vulnrichment

Updated: 2025-10-20T15:13:55.273Z

cve-icon NVD

Status : Received

Published: 2025-10-20T15:15:33.553

Modified: 2025-10-20T16:15:39.223

Link: CVE-2025-57738

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.