Skip to content

Commit 2e02a58

Browse files
1 parent ec86ed8 commit 2e02a58

File tree

1 file changed

+108
-0
lines changed

1 file changed

+108
-0
lines changed
Lines changed: 108 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,108 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-fh66-fcv5-jjfr",
4+
"modified": "2025-10-08T17:51:02Z",
5+
"published": "2025-10-08T17:51:02Z",
6+
"aliases": [
7+
"CVE-2025-61672"
8+
],
9+
"summary": "Synapse's invalid device keys degrade federation functionality",
10+
"details": "### Impact\n\nLack of validation for device keys in Synapse before 1.138.3 and in Synapse 1.139.0 allow an attacker registered on the victim homeserver to degrade federation functionality, unpredictably breaking outbound federation to other homeservers. \n\n### Patches\n\nPatched in Synapse 1.138.3, 1.138.4, 1.139.1, and 1.139.2.\n\nNote that even though 1.138.3 and 1.139.1 fix the vulnerability, they inadvertently introduced an unrelated regression. For this reason, it is recommend to skip these releases and upgrading straight to 1.138.4 and 1.139.2.\n\n### Workarounds\n\nThe vulnerability can only be exploited by users registered on the victim homeserver.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V4",
14+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "PyPI",
21+
"name": "matrix-synapse"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "1.138.3"
32+
}
33+
]
34+
}
35+
]
36+
},
37+
{
38+
"package": {
39+
"ecosystem": "PyPI",
40+
"name": "matrix-synapse"
41+
},
42+
"ranges": [
43+
{
44+
"type": "ECOSYSTEM",
45+
"events": [
46+
{
47+
"introduced": "1.139.0rc2"
48+
},
49+
{
50+
"fixed": "1.139.1"
51+
}
52+
]
53+
}
54+
]
55+
}
56+
],
57+
"references": [
58+
{
59+
"type": "WEB",
60+
"url": "https://github.com/element-hq/synapse/security/advisories/GHSA-fh66-fcv5-jjfr"
61+
},
62+
{
63+
"type": "ADVISORY",
64+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61672"
65+
},
66+
{
67+
"type": "WEB",
68+
"url": "https://github.com/element-hq/synapse/pull/17097"
69+
},
70+
{
71+
"type": "WEB",
72+
"url": "https://github.com/element-hq/synapse/commit/26aaaf9e48fff80cf67a20c691c75d670034b3c1"
73+
},
74+
{
75+
"type": "WEB",
76+
"url": "https://github.com/element-hq/synapse/commit/7069636c2d6d1ef2022287addf3ed8b919ef2740"
77+
},
78+
{
79+
"type": "PACKAGE",
80+
"url": "https://github.com/element-hq/synapse"
81+
},
82+
{
83+
"type": "WEB",
84+
"url": "https://github.com/element-hq/synapse/releases/tag/v1.138.3"
85+
},
86+
{
87+
"type": "WEB",
88+
"url": "https://github.com/element-hq/synapse/releases/tag/v1.138.4"
89+
},
90+
{
91+
"type": "WEB",
92+
"url": "https://github.com/element-hq/synapse/releases/tag/v1.139.1"
93+
},
94+
{
95+
"type": "WEB",
96+
"url": "https://github.com/element-hq/synapse/releases/tag/v1.139.2"
97+
}
98+
],
99+
"database_specific": {
100+
"cwe_ids": [
101+
"CWE-1287"
102+
],
103+
"severity": "MODERATE",
104+
"github_reviewed": true,
105+
"github_reviewed_at": "2025-10-08T17:51:02Z",
106+
"nvd_published_at": "2025-10-08T15:16:25Z"
107+
}
108+
}

0 commit comments

Comments
 (0)