We found results for “”
CVE-2025-61672
Good to know:
Date: October 8, 2025
Synapse is an open source Matrix homeserver implementation. Lack of validation for device keys in Synapse before 1.138.3 and in Synapse 1.139.0 allow an attacker registered on the victim homeserver to degrade federation functionality, unpredictably breaking outbound federation to other homeservers. The issue is patched in Synapse 1.138.3, 1.138.4, 1.139.1, and 1.139.2. Note that even though 1.138.3 and 1.139.1 fix the vulnerability, they inadvertently introduced an unrelated regression. For this reason, the maintainers of Synapse recommend skipping these releases and upgrading straight to 1.138.4 and 1.139.2.
Severity Score
Related Resources (11)
Severity Score
Weakness Type (CWE)
Improper Validation of Specified Type of Input
CWE-1287Top Fix
Upgrade Version
Upgrade to version matrix-synapse - 1.138.3;matrix-synapse - 1.139.1;https://github.com/element-hq/synapse.git - v1.138.3;https://github.com/element-hq/synapse.git - v1.139.1
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | LOW |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | NONE |
| Integrity (I): | LOW |
| Availability (A): | LOW |
Vulnerabilities
Projects
Contact Us


