{"api_version":"1","generated_at":"2026-04-23T05:15:29+00:00","cve":"CVE-2022-39374","urls":{"html":"https://cve.report/CVE-2022-39374","api":"https://cve.report/api/cve/CVE-2022-39374.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-39374","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-39374"},"summary":{"title":"CVE-2022-39374","description":"Synapse is an open-source Matrix homeserver written and maintained by the Matrix.org Foundation. If Synapse and a malicious homeserver are both joined to the same room, the malicious homeserver can trick Synapse into accepting previously rejected events into its view of the current state of that room. This can be exploited in a way that causes all further messages and state changes sent in that room from the vulnerable homeserver to be rejected. This issue has been patched in version 1.68.0","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2023-05-26 14:15:00","updated_at":"2023-09-18 04:15:00"},"problem_types":["CWE-400"],"metrics":[],"references":[{"url":"https://github.com/matrix-org/synapse/security/advisories/GHSA-p9qp-c452-f9r7","name":"https://github.com/matrix-org/synapse/security/advisories/GHSA-p9qp-c452-f9r7","refsource":"MISC","tags":[],"title":"Denial of service due to incorrect application of event authorization rules during state resolution · Advisory · matrix-org/synapse · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJIJRP5ZH6B3KGFLHCAKR2IX2Y4Z25QD/","name":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJIJRP5ZH6B3KGFLHCAKR2IX2Y4Z25QD/","refsource":"MISC","tags":[],"title":"[SECURITY] Fedora 37 Update: python-matrix-common-1.3.0-7.fc37 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/matrix-org/synapse/pull/13723","name":"https://github.com/matrix-org/synapse/pull/13723","refsource":"MISC","tags":[],"title":"Avoid putting rejected events in room state by squahtx · Pull Request #13723 · matrix-org/synapse · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-39374","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-39374","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"39374","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"matrix","cpe5":"synapse","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-39374","qid":"284524","title":"Fedora Security Update for matrix (FEDORA-2023-c0696d7b53)"},{"cve":"CVE-2022-39374","qid":"503360","title":"Alpine Linux Security Update for synapse"},{"cve":"CVE-2022-39374","qid":"506251","title":"Alpine Linux Security Update for synapse"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2022-39374","ASSIGNER":"security-advisories@github.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"Synapse is an open-source Matrix homeserver written and maintained by the Matrix.org Foundation. If Synapse and a malicious homeserver are both joined to the same room, the malicious homeserver can trick Synapse into accepting previously rejected events into its view of the current state of that room. This can be exploited in a way that causes all further messages and state changes sent in that room from the vulnerable homeserver to be rejected. This issue has been patched in version 1.68.0\n\n"}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-400: Uncontrolled Resource Consumption","cweId":"CWE-400"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"matrix-org","product":{"product_data":[{"product_name":"synapse","version":{"version_data":[{"version_affected":"=","version_value":">= 1.62.0, < 1.68.0"}]}}]}}]}},"references":{"reference_data":[{"url":"https://github.com/matrix-org/synapse/security/advisories/GHSA-p9qp-c452-f9r7","refsource":"MISC","name":"https://github.com/matrix-org/synapse/security/advisories/GHSA-p9qp-c452-f9r7"},{"url":"https://github.com/matrix-org/synapse/pull/13723","refsource":"MISC","name":"https://github.com/matrix-org/synapse/pull/13723"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJIJRP5ZH6B3KGFLHCAKR2IX2Y4Z25QD/","refsource":"MISC","name":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJIJRP5ZH6B3KGFLHCAKR2IX2Y4Z25QD/"}]},"source":{"advisory":"GHSA-p9qp-c452-f9r7","discovery":"UNKNOWN"},"impact":{"cvss":[{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":6.5,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","version":"3.0"}]}},"nvd":{"publishedDate":"2023-05-26 14:15:00","lastModifiedDate":"2023-09-18 04:15:00","problem_types":["CWE-400"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":6.5,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:matrix:synapse:*:*:*:*:*:*:*:*","versionStartIncluding":"1.62.0","versionEndExcluding":"1.68.0","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}