Vulnerability Details CVE-2025-57738
Apache Syncope offers the ability to extend / customize the base behavior on every deployment by allowing to provide custom implementations of a few Java interfaces; such implementations can be provided either as Java or Groovy classes, with the latter being particularly attractive as the machinery is set for runtime reload.
Such a feature has been available for a while, but recently it was discovered that a malicious administrator can inject Groovy code that can be executed remotely by a running Apache Syncope Core instance.
Users are recommended to upgrade to version 3.0.14 / 4.0.2, which fix this issue by forcing the Groovy code to run in a sandbox.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 15.8%
CVSS Severity
CVSS v3 Score 7.2
Products affected by CVE-2025-57738
-
cpe:2.3:a:apache:syncope:2.1.0
-
cpe:2.3:a:apache:syncope:2.1.1
-
cpe:2.3:a:apache:syncope:2.1.10
-
cpe:2.3:a:apache:syncope:2.1.11
-
cpe:2.3:a:apache:syncope:2.1.12
-
cpe:2.3:a:apache:syncope:2.1.13
-
cpe:2.3:a:apache:syncope:2.1.14
-
cpe:2.3:a:apache:syncope:2.1.2
-
cpe:2.3:a:apache:syncope:2.1.3
-
cpe:2.3:a:apache:syncope:2.1.4
-
cpe:2.3:a:apache:syncope:2.1.5
-
cpe:2.3:a:apache:syncope:2.1.6
-
cpe:2.3:a:apache:syncope:2.1.7
-
cpe:2.3:a:apache:syncope:2.1.8
-
cpe:2.3:a:apache:syncope:2.1.9
-
cpe:2.3:a:apache:syncope:3.0.0
-
cpe:2.3:a:apache:syncope:3.0.1
-
cpe:2.3:a:apache:syncope:3.0.10
-
cpe:2.3:a:apache:syncope:3.0.11
-
cpe:2.3:a:apache:syncope:3.0.12
-
cpe:2.3:a:apache:syncope:3.0.2
-
cpe:2.3:a:apache:syncope:3.0.3
-
cpe:2.3:a:apache:syncope:3.0.4
-
cpe:2.3:a:apache:syncope:3.0.5
-
cpe:2.3:a:apache:syncope:3.0.6
-
cpe:2.3:a:apache:syncope:3.0.7
-
cpe:2.3:a:apache:syncope:3.0.8
-
cpe:2.3:a:apache:syncope:3.0.9
-
cpe:2.3:a:apache:syncope:4.0.0