{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T07:27:12.733","vulnerabilities":[{"cve":{"id":"CVE-2024-37303","sourceIdentifier":"security-advisories@github.com","published":"2024-12-03T17:15:10.890","lastModified":"2025-08-26T15:09:47.387","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Synapse is an open-source Matrix homeserver. Synapse before version 1.106 allows, by design, unauthenticated remote participants to trigger a download and caching of remote media from a remote homeserver to the local media repository. Such content then also becomes available for download from the local homeserver in an unauthenticated way. The implication is that unauthenticated remote adversaries can use this functionality to plant problematic content into the media repository. Synapse 1.106 introduces a partial mitigation in the form of new endpoints which require authentication for media downloads. The unauthenticated endpoints will be frozen in a future release, closing the attack vector."},{"lang":"es","value":"Synapse es un servidor doméstico Matrix de código abierto. La versión 1.106 de Synapse permite, por diseño, que los participantes remotos no autenticados activen una descarga y un almacenamiento en caché de contenido multimedia remoto desde un servidor doméstico remoto al repositorio de contenido multimedia local. Dicho contenido también se vuelve disponible para su descarga desde el servidor doméstico local de forma no autenticada. La implicación es que los adversarios remotos no autenticados pueden usar esta funcionalidad para introducir contenido problemático en el repositorio de contenido multimedia. La versión 1.106 de Synapse introduce una mitigación parcial en forma de nuevos endpoints que requieren autenticación para las descargas de contenido multimedia. Los endpoints no autenticados se congelarán en una versión futura, lo que cerrará el vector de ataque."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-306"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:matrix:synapse:*:*:*:*:*:*:*:*","versionEndExcluding":"1.106.0","matchCriteriaId":"F7574431-51E3-465D-A1B9-5D05FD28160B"}]}]}],"references":[{"url":"https://github.com/element-hq/synapse/security/advisories/GHSA-gjgr-7834-rhxr","source":"security-advisories@github.com","tags":["Vendor Advisory"]},{"url":"https://github.com/matrix-org/matrix-spec-proposals/pull/3916","source":"security-advisories@github.com","tags":["Issue Tracking","Patch"]}]}}]}