Home

Description

Synapse is an open source Matrix homeserver implementation. Lack of validation for device keys in Synapse before 1.138.3 and in Synapse 1.139.0 allow an attacker registered on the victim homeserver to degrade federation functionality, unpredictably breaking outbound federation to other homeservers. The issue is patched in Synapse 1.138.3, 1.138.4, 1.139.1, and 1.139.2. Note that even though 1.138.3 and 1.139.1 fix the vulnerability, they inadvertently introduced an unrelated regression. For this reason, the maintainers of Synapse recommend skipping these releases and upgrading straight to 1.138.4 and 1.139.2.

PUBLISHED Reserved 2025-09-29 | Published 2025-10-08 | Updated 2025-10-08 | Assigner GitHub_M




MEDIUM: 5.3CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N

Problem types

CWE-1287: Improper Validation of Specified Type of Input

Product status

< 1.138.3
affected

= 1.139.0
affected

References

github.com/...ynapse/security/advisories/GHSA-fh66-fcv5-jjfr

github.com/element-hq/synapse/pull/17097

github.com/...ommit/26aaaf9e48fff80cf67a20c691c75d670034b3c1

github.com/...ommit/7069636c2d6d1ef2022287addf3ed8b919ef2740

github.com/element-hq/synapse/releases/tag/v1.138.3

github.com/element-hq/synapse/releases/tag/v1.139.1

cve.org (CVE-2025-61672)

nvd.nist.gov (CVE-2025-61672)

Download JSON