|
|
Message-ID: <216d53c2-a071-3960-0ac0-ca7e659b1c6a@apache.org> Date: Mon, 02 Feb 2026 11:51:33 +0000 From: Francesco Chicchiriccò <ilgrosso@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2026-23794: Apache Syncope: Reflected XSS on Enduser Login Severity: important Affected versions: - Apache Syncope (org.apache.syncope.client.idrepo:syncope-client-idrepo-common-ui) 3.0 through 3.0.15 - Apache Syncope (org.apache.syncope.client.idrepo:syncope-client-idrepo-common-ui) 4.0 through 4.0.3 Description: Reflected XSS in Apache Syncope's Enduser Login page. An attacker that tricks a legitimate user into clicking a malicious link and logging in to Syncope Enduser could steal that user's credentials. This issue affects Apache Syncope: from 3.0 through 3.0.15, from 4.0 through 4.0.3. Users are recommended to upgrade to version 3.0.16 / 4.0.4, which fix this issue. Credit: Kasper Karlsson (finder) Karin Taliga (finder) References: https://syncope.apache.org/ https://www.cve.org/CVERecord?id=CVE-2026-23794
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.