CVE-2026-23795
BaseFortify
Publication date: 2026-02-03
Last updated on: 2026-02-06
Assigner: Apache Software Foundation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| apache | syncope | From 3.0.0 (inc) to 3.0.16 (exc) |
| apache | syncope | From 4.0.0 (inc) to 4.0.4 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-611 | The product processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-23795 is an Improper Restriction of XML External Entity (XXE) vulnerability in the Apache Syncope Console, specifically affecting the Keymaster parameters functionality.
An administrator with sufficient privileges to create or edit Keymaster parameters via the Console can craft malicious XML input that triggers an XXE attack.
This attack can cause sensitive data leakage by exploiting the way XML external entities are processed.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows an administrator with sufficient privileges to perform an XML External Entity (XXE) attack via the Apache Syncope Console, potentially causing sensitive data leakage.
Such sensitive data leakage could negatively impact compliance with data protection standards and regulations like GDPR and HIPAA, which require strict controls to prevent unauthorized disclosure of personal or protected health information.
Therefore, if exploited, this vulnerability may lead to violations of these regulations due to exposure of sensitive data.
Upgrading to fixed versions (3.0.16 / 4.0.4) is recommended to mitigate this risk and help maintain compliance.
How can this vulnerability impact me? :
If exploited, this vulnerability can lead to leakage of sensitive data from the system running Apache Syncope.
Since the attack requires an administrator with adequate entitlements, the impact depends on the level of access an attacker can obtain.
The vulnerability does not affect integrity or availability directly but compromises confidentiality.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, users are recommended to upgrade Apache Syncope to version 3.0.16 or 4.0.4, which contain fixes for this issue.
Since the vulnerability involves an administrator with privileges to create or edit Keymaster parameters via the Console, restricting such privileges to trusted users can also help reduce risk.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know