Improper access control in Synapse - CVE-2021-21392

 

Improper access control in Synapse - CVE-2021-21392

Published: April 12, 2021 / Updated: May 4, 2026


Vulnerability identifier: #VU129607
CSH Severity: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2021-21392
CWE-ID: CWE-284
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Synapse
Software vendor:
Matrix.org

Description

The vulnerability allows a remote attacker to make the server send requests to internal infrastructure.

The vulnerability exists due to improper access control in outbound request handling when processing user-provided domains with transitional IPv6 addresses on dual-stack networks. A remote attacker can provide a crafted domain that resolves to a transitional IPv6 address to make the server send requests to internal infrastructure.

Outbound requests to federation, identity servers, third-party invite key validity checks, push notifications, and URL preview generation are affected.


Remediation

Install security update from vendor's website.

External links