CVE-2025-57738

📊 7.2 HIGH0.1%🎯 0 exploits
📅 Published Oct 20, 2025
📋 Status: Analyzed

Apache Syncope offers the ability to extend / customize the base behavior on every deployment by allowing to provide custom implementations of a few Java interfaces; such implementations can be provided either as Java or Groovy classes, with the latter being particularly attractive as the machinery is set for runtime reload. Such a feature has been available for a while, but recently it was discovered that a malicious administrator can inject Groovy code that can be executed remotely by a running Apache Syncope Core instance. Users are recommended to upgrade to version 3.0.14 / 4.0.2, which fix this issue by forcing the Groovy code to run in a sandbox.

🎯 Affected Products & Systems

2 product configurations affected

Filter by type:
📱
Application
Vulnerable
Version: ≥ 2.1.0 ∧ < 3.0.14
CPE:
cpe:2.3:a:apache:syncope:*:*:*:*:*:*:*:*
📱
Application
Vulnerable
Version: ≥ 4.0.0 ∧ < 4.0.2
CPE:
cpe:2.3:a:apache:syncope:*:*:*:*:*:*:*:*
Metrics
7.2 HIGHCVSS v3.1134c704f-9b21-4f2e-91b3-4a467353bcc0
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Attack Vector:
NETWORK
Complexity:
LOW
Privileges:
HIGH
User Interaction:
NONE
Confidentiality:
HIGH
Integrity:
HIGH
Availability:
HIGH
Scope:
UNCHANGED

🔍 Technical Details

Analysis Status
Analyzed
CVSS Details
7.2 (HIGH)v3.1
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
EPSS Details
0.1% (Minimal)24.7th percentile
Last updated: Oct 31, 2025
Exploitation probability within 30 days
Published Date
Oct 20, 2025 (13 days ago)
Last Modified
Oct 28, 2025 (5 days ago)
Security Weaknesses1
References2