Apache Syncope allows malicious administrators to inject Groovy code
High severity
GitHub Reviewed
Published
Oct 20, 2025
to the GitHub Advisory Database
•
Updated Oct 20, 2025
Package
Affected versions
< 3.0.14
>= 4.0.0-M0, < 4.0.2
Patched versions
3.0.14
4.0.2
Description
Published by the National Vulnerability Database
Oct 20, 2025
Published to the GitHub Advisory Database
Oct 20, 2025
Reviewed
Oct 20, 2025
Last updated
Oct 20, 2025
Apache Syncope offers the ability to extend / customize the base behavior on every deployment by allowing to provide custom implementations of a few Java interfaces; such implementations can be provided either as Java or Groovy classes, with the latter being particularly attractive as the machinery is set for runtime reload.
Such a feature has been available for a while, but recently it was discovered that a malicious administrator can inject Groovy code that can be executed remotely by a running Apache Syncope Core instance.
Users are recommended to upgrade to version 3.0.14 / 4.0.2, which fix this issue by forcing the Groovy code to run in a sandbox.
References