Author: ilgrosso
Date: Mon Feb  2 12:10:47 2026
New Revision: 1931655

Log:
Updating security page

Modified:
   syncope/site/security.html

Modified: syncope/site/security.html
==============================================================================
--- syncope/site/security.html  Mon Feb  2 11:44:09 2026        (r1931654)
+++ syncope/site/security.html  Mon Feb  2 12:10:47 2026        (r1931655)
@@ -97,6 +97,129 @@
       
 <p>If you want to report a vulnerability, please follow <a 
href="https://www.apache.org/security/"; class="externalLink">the 
procedure</a>.</p>
 
+      <section><a 
id="CVE-2026-23795.3A_Apache_Syncope.3A_Console_XXE_on_Keymaster_parameters"></a>
+<h2>CVE-2026-23795: Apache Syncope: Console XXE on Keymaster parameters</h2>
+        
+<p>Improper Restriction of XML External Entity Reference vulnerability in 
Apache Syncope Console.</p>
+        
+<p>An administrator with adequate entitlements to create or edit Keymaster 
parameters via Console can construct malicious XML text to launch an XXE 
attack, thereby causing sensitive data leakage occurs.
+Reflected XSS in Apache Syncope's Enduser Login page.</p>
+
+        
+<p>
+          <b>Severity</b>
+        </p>
+        
+<p>Important</p>
+
+        
+<p>
+          <b>Affects</b>
+        </p>
+        
+<p>
+          </p>
+<ul>
+            
+<li>4.0 through 4.0.3</li>
+            
+<li>3.0 through 3.0.15</li>
+          </ul>
+        
+
+        
+<p>
+          <b>Solution</b>
+        </p>
+        
+<p>
+          </p>
+<ul>
+            
+<li>Users are recommended to upgrade to version 4.0.4 / 3.0.16 which fix this 
issue.</li>
+          </ul>
+        
+
+        
+<p>
+          <b>Fixed in</b>
+        </p>
+        
+<p>
+          </p>
+<ul>
+            
+<li>Release 4.0.4</li>
+            
+<li>Release 3.0.16</li>
+          </ul>
+        
+
+        
+<p>Read the <a href="https://www.cve.org/CVERecord?id=CVE-2026-23795"; 
class="externalLink">full CVE advisory</a>.</p>
+      </section>
+
+      <section><a 
id="CVE-2026-23794.3A_Apache_Syncope.3A_Reflected_XSS_on_Enduser_Login"></a>
+<h2>CVE-2026-23794: Apache Syncope: Reflected XSS on Enduser Login</h2>
+        
+<p>Reflected XSS in Apache Syncope's Enduser Login page.</p>
+        
+<p>An attacker that tricks a legitimate user into clicking a malicious link 
and logging in to Syncope Enduser could steal that user's credentials.</p>
+
+        
+<p>
+          <b>Severity</b>
+        </p>
+        
+<p>Important</p>
+
+        
+<p>
+          <b>Affects</b>
+        </p>
+        
+<p>
+          </p>
+<ul>
+            
+<li>4.0 through 4.0.3</li>
+            
+<li>3.0 through 3.0.15</li>
+          </ul>
+        
+
+        
+<p>
+          <b>Solution</b>
+        </p>
+        
+<p>
+          </p>
+<ul>
+            
+<li>Users are recommended to upgrade to version 4.0.4 / 3.0.16 which fix this 
issue.</li>
+          </ul>
+        
+
+        
+<p>
+          <b>Fixed in</b>
+        </p>
+        
+<p>
+          </p>
+<ul>
+            
+<li>Release 4.0.4</li>
+            
+<li>Release 3.0.16</li>
+          </ul>
+        
+
+        
+<p>Read the <a href="https://www.cve.org/CVERecord?id=CVE-2026-23794"; 
class="externalLink">full CVE advisory</a>.</p>
+      </section>
+
       <section><a 
id="CVE-2025-65998.3A_Apache_Syncope.3A_Default_AES_key_used_for_internal_password_encryption"></a>
 <h2>CVE-2025-65998: Apache Syncope: Default AES key used for internal password 
encryption</h2>
         

Reply via email to