CVE-2026-23795
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2026-02-03

Last updated on: 2026-02-06

Assigner: Apache Software Foundation

Description
Improper Restriction of XML External Entity Reference vulnerability in Apache Syncope Console. An administrator with adequate entitlements to create or edit Keymaster parameters via Console can construct malicious XML text to launch an XXE attack, thereby causing sensitive data leakage occurs. This issue affects Apache Syncope: from 3.0 through 3.0.15, from 4.0 through 4.0.3. Users are recommended to upgrade to version 3.0.16 / 4.0.4, which fix this issue.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-03
Last Modified
2026-02-06
Generated
2026-05-07
AI Q&A
2026-02-03
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
apache syncope From 3.0.0 (inc) to 3.0.16 (exc)
apache syncope From 4.0.0 (inc) to 4.0.4 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-611 The product processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-23795 is an Improper Restriction of XML External Entity (XXE) vulnerability in the Apache Syncope Console, specifically affecting the Keymaster parameters functionality.

An administrator with sufficient privileges to create or edit Keymaster parameters via the Console can craft malicious XML input that triggers an XXE attack.

This attack can cause sensitive data leakage by exploiting the way XML external entities are processed.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows an administrator with sufficient privileges to perform an XML External Entity (XXE) attack via the Apache Syncope Console, potentially causing sensitive data leakage.

Such sensitive data leakage could negatively impact compliance with data protection standards and regulations like GDPR and HIPAA, which require strict controls to prevent unauthorized disclosure of personal or protected health information.

Therefore, if exploited, this vulnerability may lead to violations of these regulations due to exposure of sensitive data.

Upgrading to fixed versions (3.0.16 / 4.0.4) is recommended to mitigate this risk and help maintain compliance.


How can this vulnerability impact me? :

If exploited, this vulnerability can lead to leakage of sensitive data from the system running Apache Syncope.

Since the attack requires an administrator with adequate entitlements, the impact depends on the level of access an attacker can obtain.

The vulnerability does not affect integrity or availability directly but compromises confidentiality.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, users are recommended to upgrade Apache Syncope to version 3.0.16 or 4.0.4, which contain fixes for this issue.

Since the vulnerability involves an administrator with privileges to create or edit Keymaster parameters via the Console, restricting such privileges to trusted users can also help reduce risk.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart